DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING

The telecommunication network that is the assemblage of the terminal nodes enables the whole to be connected. The swift progress in the telecommunication networks and the information technology has enabled a seamless connection and the capacity to store and communicate vast scale of information in the form of text and voice that are sensitive. This makes the telecommunication networks prey to multiple cyber-threats of which the DDOS (distributed denial of service) are the more predominant type of the cyber-threat causing the denial of the services to the users. So the paper utilizing the combination of the neural network and the support vector machine presents the detection and the classification method for the DDOS attacks in the telecommunication network. The performance evaluation using the network simulator-2 enables to have the enhanced detection accuracy for the proposed method.

[1]  Ramesh Govindan,et al.  COSSACK: Coordinated Suppression of Simultaneous Attacks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[2]  Richard E. Overill,et al.  Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.

[3]  Clay Shields,et al.  What do we mean by Network Denial of Service , 2002 .

[4]  Aiko Pras,et al.  Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options? , 2017, IEEE Communications Magazine.

[5]  David Duke Hack of the Month: What is the difference between Denial-of-Service (DoS) and Distributed-Denial-of-Service (DDoS)? , 2002 .

[6]  Yongxin Feng,et al.  A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack , 2018, Secur. Commun. Networks.

[7]  Jisa David,et al.  DDoS Attack Detection Using Fast Entropy Approach on Flow- Based Network Traffic , 2015 .

[8]  Steve Mansfield-Devine,et al.  The growth and evolution of DDoS , 2015, Netw. Secur..

[9]  Mohammad S. Obaidat,et al.  Fundamentals of performance evaluation of computer and telecommunication systems , 2010 .

[10]  Jose Nazario,et al.  DDoS: DDoS attack evolution , 2008 .

[11]  Alex Mathews What can machine learning do for information security? , 2019, Netw. Secur..

[12]  Sean Newman Under the radar: the danger of stealthy DDoS attacks , 2019, Netw. Secur..

[13]  Klaus Aachen Fundamentals Of Performance Evaluation Of Computer And Telecommunications Systems , 2016 .