Machine Learning Techniques Used in Detection of DOS Attacks: A Literature Review

Due to increasing complexity of systems, it is easier to compromise computer systems. Thus in order to detect attacks, Intrusion Detection Systems / Intrusion Prevention Systems is employed. Intrusion Detection Systems / Intrusion Prevention Systems is the most basic way to protect the network. IDS/IPS systems follow two different approaches on how to detect intruders: signature-based or anomaly-based detection. A signature-based IDS monitors packets on a specified network and then compares these packets against a set of signatures from known malicious threats. The anomaly-based detection technique centres on the concept of a baseline for network behaviour. Baseline can be considered as description of the type of network behaviour that can be accepted or is normal, any deviation from this baseline is considered as an anomaly. Therefore Anomaly based Intrusion detection uses machine learning techniques to detect whether a packet is intrusive or non-intrusive. The focal point of our study is to provide a systematic review of machine learning techniques used in dos attack detection.

[1]  Vipin Das,et al.  Network Intrusion Detection System Based On Machine Learning Algorithms , 2010 .

[2]  Norbik Bashah Idris,et al.  Anomaly intrusion detection based on fuzzy logic and data mining , 2006 .

[3]  S. Mercy Shalinie,et al.  Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset , 2011, 2011 Third International Conference on Advanced Computing.

[4]  S. Saraswathi Fuzzy Based Detection and Prediction of DDoS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network , 2013 .

[5]  Rajagopalan Vijayasarathy,et al.  A system approach to network modeling for DDoS detection using a Naìve Bayesian classifier , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[6]  Kapil Sharma,et al.  Intrusion Detection System with Multi Layer using Bayesian Networks , 2013 .

[7]  M. Iqbal Saripan,et al.  Detection of Denial of Service Attacks against Domain Name System Using Neural Networks , 2009, ArXiv.

[8]  Vasilios Katos,et al.  Real time DDoS detection using fuzzy estimators , 2012, Comput. Secur..

[9]  Dhanalakshmi Srinivasan,et al.  NETWORK INTRUSION DETECTION USING HIDDEN NAIVE BAYES MULTICLASS CLASSIFIER MODEL , 2014 .

[10]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[11]  C. Emilin Shyni,et al.  DoS Attack Detection Based on Naive Bayes Classifier , 2015 .

[12]  Pankaj Salunkhe,et al.  Denial-Of -Service Attack Detection Using KDD , 2015 .

[13]  Claire Cardie,et al.  Proceedings of the Eighteenth International Conference on Machine Learning, 2001, p. 577–584. Constrained K-means Clustering with Background Knowledge , 2022 .

[14]  Hoda Waguih,et al.  A Data Mining Approach for the Detection of Denial of Service Attack , 2013 .

[15]  Ruhi Kabra,et al.  Layered architecture for DoS attack detection system by combine approach of Naive bayes and Improved K-means Clustering Algorithm , 2015 .

[16]  Gopinath Ganapathy,et al.  A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment , 2014, Int. J. Commun. Networks Inf. Secur..

[17]  Mohammed Salem,et al.  Identifying DOS attacks using data pattern analysis , 2008 .

[18]  Rung Ching Chen,et al.  Using Rough Set and Support Vector Machine for Network Intrusion Detection System , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.

[19]  Wuu Yang,et al.  DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.

[20]  S J Ghule,et al.  Network Intrusion Detection System using Fuzzy Logic , 2014 .

[21]  Ghazi Al-Naymat,et al.  Detecting Distributed Denial of Service Attacks Using Data Mining Techniques , 2016 .

[22]  Gopinath Ganapathy,et al.  A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment , 2014 .

[23]  Chittur,et al.  Model Generation for an Intrusion Detection System Using Genetic Algorithms , 2001 .

[24]  David J. Miller,et al.  Botnet Detection Through Fine Flow Classification , 2011 .

[25]  Tawfiq Barhoom,et al.  An Approach for Detecting and Preventing DoS Attacks in LAN , 2014 .

[26]  V. Naveenantony Raj NETWORK INTRUSION DETECTION USING HIDDEN NAIVE BAYES MULTICLASS CLASSIFIER MODEL , 2014 .

[27]  T. Subbulakshmi,et al.  A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS , 2013 .

[28]  G. Cem,et al.  Denial-of-Service Attack Detection , 2014 .

[29]  Madhav Kale,et al.  DDOS Attack Detection Based on an Ensemble of Neural Classifier , 2014 .

[30]  Ivan Shabalin,et al.  The MP13 approach to the KDD'99 classifier learning contest , 2000, SKDD.

[31]  Dewan Md. Farid,et al.  Attacks classification in adaptive intrusion detection using decision tree , 2010 .

[32]  Md. Abu Naser Bikas,et al.  An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.

[33]  M. Wahengbam,et al.  Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.