Implementation of QOS in SDN and Distributed Networks For Mitigation of DDOS Based Attacks Using Mach
Implementation of QOS in SDN and Distributed Networks For Mitigation of DDOS Based Attacks Using Mach
Machine Learning
Subhash Kumar*1 Dr. Kishor Kolhe*2
School of Computer Engineering and Technology, School of Computer Engineering and Technology,
MIT World Peace University, MIT World Peace University,
Pune, India Pune, India
[email protected] [email protected]
Abstract: Distributed Denial Service of Service (DDoS) is very address, requested resource, and server response, providing
sophisticated attack which brute-force packet jamming to a insights into server performance and potential security threats.
network to render it useless, if done with large number of nodes.
It can be easily countered by a number of techniques such as load Anomaly detection on HTTP is pivotal for cybersecurity,
balancing, rate limiting and many newer intelligent systems aiming to identify irregular patterns that deviate from expected
techniques but attackers are continuously developing new behavior, indicative of attacks or performance issues. Machine
techniques to circumvent traditional defense mechanisms. The learning is increasingly leveraged in this realm due to its
Sophistication of the attack is determined by current defenses in capacity to discern new patterns. The research delves into using
place and duration of attack. The use of DDoS attack is done on machine learning techniques for anomaly detection in system
distributed Network traffic by an attacker which might send more performance analysis. The study comprises of four sections:
traffic than a network card can handle or overwhelm an
application with more requests than it can process which might led 1. Related works on anomaly detection for DDoS attacks
to not able to add legitimate user to the application With coming using machine learning.
of Web 3.0 the DDoS attack grown exponentially , So we are 2. Detailed explanation of the proposed method.
proposing a Machine Learning based traffic filtering system by
which we can determine the legitimate user entering to our 3. Performance results of various machine learning
application resources with encrypted HTTPS traffic. Pirated and algorithms.
duplicate IP events filtering will lead to clean resources inside
Web3.0 and gaming environment which will improve the efficiency, 4. Conclusion summarizing the research findings.
latency and performance of game and similar resources. We will The core principle of the software-defined networking
use QoS parameters in SDN parameters to define the network (SDN) an innovative network architecture, lies in decoupling the
governance and tuning mechanism so that application traffic is
control and data planes, centralizing the network's state logically
correctly routed and prioritized. One of the major reasons to
propose this research is because right now the major rDDoS
and the abstraction of the controller from the underlying network
attacks shifted from L3/L4 Network Layer to L7 Application layer infrastructure. [2]
causing major increase in attack size ratio. The emergence of SDN significantly enhances the network's
dynamism, controllability, extensibility, and manageability.
Keywords: DDoS, Software Defined Network (SDN), Distributed However, with the growing adoption of SDN applications,
Networks, Cyberattack, Quality of Service (QoS), IoT, Attack security challenges have emerged as a critical area of research,
Detection, Botnet, rDDoS, SMTP.
with distributed denial-of-service (DDoS) attacks standing out
I. INTRODUCTION as a major concern.
The growth of big data, cloud computing, and other The study emphasizes how difficult it is to identify the
emerging technologies is causing network traffic to increase source of DDoS attacks because they might come from a variety
continuously. The demands of network scalability, management, of sources. By examining network traffic patterns, Intrusion
and flexibility are difficult for the traditional network Detection Systems (IDS) are essential in spotting and stopping
architecture, which is based on IP. The report lists several these types of assaults. They help identify the type of attacks and
protocols, such as TCP, ICMP, UDP, SYN, and HTTP, that can provide advice on how to mitigate it, assisting organizations in
be used to carry out DDoS assaults. DDoS attacks rely on meeting their legal responsibilities and protecting confidential
worldwide botnets that employ well-known attack tools, which information for data security.
are often shared and reused among different groups across Given the importance of promptly detecting and preventing
various botnets. [1] DDoS attacks, there is a pressing need to design robust IDS
HTTP attacks, in particular, can be detected by scrutinizing capable of real-time detection and prevention. The study aims to
web server logs for abnormal or malicious requests and patterns. evaluate different intrusion detection and mitigation strategies to
These logs record crucial details such as request time, client IP combat DDoS attacks effectively. It also aims to provide insights
for creating more resilient and efficient IDS systems. Machine
2
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on February 20,2025 at 17:34:41 UTC from IEEE Xplore. Restrictions apply.
Euclidean distance, and a ratio ri is calculated as Δi/k, then
normalized to rx < = ri / ∑ ri.
The total number of synthetic samples to generate for each
xi is gi = rx * G. [11]
The synthetic samples are then iteratively created for each xi
up to gi in the same way as the SMOTE algorithm.
This Dataset is of a server log and it classifies sessions as
suspicious or not and we have to predict the right class. We are
trying to see what factors and feature knowledge are responsible
Fig. 3. Proposed ML based DDoS security Framework for malicious activities. Staring with preprocessing steps
followed by EDA which includes data cleaning and label
The dataset is firstly examined to determine any duplicate encoding, finding null values, finding correlation patterns in the
records and then for the balanced and imbalanced class so that dataset.
the overfitting and underfitting can be minimized and we can
determine the other techniques oversampling and under
sampling methods using SMOTE algorithms to address those
challenges. [5]
The minority instances are oversampled and rendered
equivalent to the majority class using the SMOTE algorithm.
There are the same number of records in both categories.
More precisely, the number of members of the minority class Fig. 5. Data Preprocessing
has surpassed that of the majority class. View the accuracy and
recall outcomes following the application of the SMOTE The data preprocessing and cleaning is done rigorously and
algorithm (oversampling). A balanced number of classes in the firstly the data is trained on decision tree classifier to find the
dataset can be achieved by employing oversampling and feature importance and then on the basis the model got built that
undersampling approaches to it for datasets that use feature we can have our customized model which gives better
selection and random sampling. [12] confidence in finding DDoS attack patterns. [7]
Each algorithm possesses unique strengths and the potential Data Preprocessing led to conversion of some of attributes.
to enhance detection accuracy and robustness in server log The Bytes variable is an object data type and the model would
analysis. not recognize it as a number. Therefore, we need to convert the
M attribute. We can clearly see the class imbalance problem as
per our dataset hence SMOTE has been used. Fig 4 suggests the
normal, suspicious and unknown class for the dataset.
3
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on February 20,2025 at 17:34:41 UTC from IEEE Xplore. Restrictions apply.
legitimate and 1 is not. Therefore, a binary classifier model does lead to good results. Correlation Heatmap shows how each
not need to be complicated in order to attain a high accuracy of variable is correlated with class variable which we will try to
99% and forecast all outcomes as 0, which denotes non- predict. [8]
fraudulent. Clearly, the accuracy metric is biased and not
desirable in such situations where the class distribution is
skewed.
Resampling is a commonly used technique to address
unbalanced datasets of large size, while oversampling creates
fake data to balance the data, undersampling decreases the
majority class and may result in the loss of crucial data. There
are basically two types of approaches for this: i) undersampling
and ii) oversampling. In general, oversampling methods are
preferred over undersampling ones. The rationale is that when Fig. 8. Data correlation to find hidden patterns
we undersample, we frequently exclude data points that might
contain significant information. I am primarily discussing A list of several flag variables that are required in the
SMOTE and its related unique data augmentation oversampling networking field may be found in the Flags field. A "." is used
techniques in this paper. [13] whenever a specific flag is not set. In order to assist the model,
learn more quickly and build stronger relationships, we must
SMOTE is an oversampling technique that creates synthetic divide each column into individual variables for the flags.
samples for the minority class. This approach helps to solve the
overfitting problem caused by random oversampling. By Dropping some unnecessary columns and columns having a
focusing on the feature space, it uses interpolation between single value like flows and tos. In Fig 8. we have taken limited
positively aligned examples to generate new instances. features to make the model for detection of DDoS attack or
Intrusion. [7]
4
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on February 20,2025 at 17:34:41 UTC from IEEE Xplore. Restrictions apply.
spotting odd behaviors or trends that could point to security
lapses, like attempted illegal access or possible cyberattacks.
This experiment employs five algorithms to detect anomalies in
server logs LR, k-NN, SVM, DT, RF, and ANN—to identify
anomalies in server logs. To get a balanced number of classes in
the dataset, oversampling and undersampling techniques are
appropriate. The studies' results show that the RF algorithm
performs best on datasets that employ random sampling and
feature selection. The F1-score, recall, accuracy, and precision
measures all remain at 97.348%.
On the other hand, depending too much on artificial methods
such as oversampling and undersampling may induce biases or
distort the original distribution of data.
This transition from device-based application delivery and
security to network-wide services is driven by attack detection
Fig. 11. Confusion Matrix of the model built for checking TP, FP, TN and FN. and mitigation. Organizations can get more effective, adaptable,
and scalable security management by utilizing SDN as an
Below is the Formula of Information Gain and Entropy that enabling architecture. By improving network visibility and
is used to determine the loss and accuracy in Decision Tree control, this strategy enables the entire infrastructure to react
models. [9] dynamically to new threats.
x Information Gain: A statistical characteristic It is now evident from this research that the distributed
denial-of-service (DDoS) attack we are facing is well-planned
x evaluates the degree to which a certain attribute
and beyond the capabilities of the security tools we now have.
distinguishes the training samples based on their
Even though DDoS attacks are becoming more common, our
intended classification.
company lacks the necessary skills to handle anything this big.
x Entropy: measures purity of collection of data With a sharp increase in malicious web and DNS queries, DDoS
attacks are moving more and more to the application layer,
x Entropy is calculated as -p+ log₂ p+ - p- log₂ p- namely targeting HTTP/S. As more services shift to web
x Gain(S, A) = Entropy(S) - Σ [(|Sv| / |S|) * applications, the threat of web DDoS attacks is increasing due
Entropy(Sv)], where Sv represents subsets of S based to the deployment of sophisticated botnets and new attack tools.
on the attribute A. REFERENCES
x Entropy = 0 indicates that all training data points [1] B. Paharia and K. Bhushan, ‘‘A comprehensive review of distributed
belong to the same class. denial of service (DDoS) attacks in fog computing environment,’’ in
Handbook of Computer Networks and Cyber Security: Principles and
x Entropy = 1 means the training dataset has an equal Paradigms, 2020, pp. 493–524.
number of positive and negative samples. [2] Q. Liao, H. Li, S. Kang, and C. Liu, ‘‘Application layer DDoS attack
detection using cluster with label based on sparse vector decomposition
x 0 < Entropy < 1 implies that the training dataset has an and rhythm matching,’’ Secur. Commun. Netw., vol. 8, no. 17, pp. 3111–
unequal number of positive and negative samples. 3120, Nov. 2015.
[3] L. Lv, W. Wang, Z. Zhang, and X. Liu, ‘‘A novel intrusion detection
system based on an optimal hybrid kernel extreme learning machine,’’
Knowl.- Based Syst., vol. 195, May 2020, Art. no. 105648.
[4] C. Yin, Y. Zhu, J. Fei, and X. He, ‘‘A deep learning approach for intrusion
detection using recurrent neural networks,’’ IEEE Access, vol. 5, pp.
21954–21961, 2017.
[5] S. Behal and K. Kumar, ‘‘Trends in validation of DDoS research,’’ Proc.
Comput. Sci., vol. 85, pp. 7–15, Jan. 2016.
[6] A. E. Cil, K. Yildiz, and A. Buldu, ‘‘Detection of DDoS attacks with feed
forward based deep neural network model,’’ Expert Syst. Appl., vol. 169,
May 2021, Art. no. 114520.
[7] M. Motylinski, Á. MacDermott, F. Iqbal, and B. Shah, ‘‘A GPU-based
machine learning approach for detection of botnet attacks,’’ Comput.
Secur., vol. 123, Dec. 2022, Art. no. 102918.
[8] A. B. d. Neira, A. M. d. Araujo, and M. Nogueira, “An intelligent system
for DDoS attack prediction based on early warning signals,” IEEE Trans.
Fig. 12.
Comparison of Model Accuracy Netw. Service Manag., vol. 20, no. 2, pp. 1254–1266, Jun. 2023.
[9] D. M. Sharif, H. Beitollahi, and M. Fazeli, “Detection of application-layer
V. CONCLUSION AND FUTURE WORK DDoS attacks produced by various freely accessible toolkits using
machine learning,” IEEE Access, vol. 11, pp. 51810–51819, 2023.
There are several advantages of utilizing machine learning [10] N. Agrawal and S. Tapaswi, “Defense mechanisms against DDoS attacks
methods for anomaly detection in server logs. It assists in in a cloud computing environment: State-of-the-art and research
5
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on February 20,2025 at 17:34:41 UTC from IEEE Xplore. Restrictions apply.
challenges,” IEEE Commun. Surv. & Tuts., vol. 21, no. 4, pp. 3769–3795,
Fourth Quarter 2019.
[11] K. Wang, D. Du, S. Maharjan, and Y. Sun, “Strategic honeypot game
model for distributed denial of service attacks in the smart grid,” IEEE
Trans. Smart Grid, vol. 8, no. 5, pp. 2474–2482, Sep. 2017.
[12] S. K. Khattab, C. Sangpachatanaruk, D. Mosse, R. Melhem, and T. Znati,
“Roaming honeypots for mitigation service-level denial-of-service
attacks,” in Proc. 24th Int. Conf. Distrib. Comput. Syst., 2004, pp. 328–
337.
[13] Li Z , Jin H , Zou D , et al. Exploring New Opportunities to Defeat Low-
Rate DDoS Attack in Container-Based Cloud Environment[J]. IEEE
Transactions on Parallel and Distributed Systems, 2019, PP(99):1-1.
6
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on February 20,2025 at 17:34:41 UTC from IEEE Xplore. Restrictions apply.