Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection

As this paper has expounded, the techniques against DDoS attacks borrow greatly from the already tested traditional techniques. However, no technique has proven to be perfect towards the full detection and prevention of DDoS attacks. Intrusion detection system (IDS) using machine learning approach is one of the implemented solutions against harmful attacks. However, achieving high detection accuracy with minimum false positive rate remains issue that still need to be addressed. Consequently, this study carried out an experimental evaluation on various machine learning algorithms such as Random forest J48, Naïve Bayes, IBK and Multilayer perception on HTTP DDoS attack dataset. The dataset has a total number of 17512 instances which constituted normal (10256) and HTTP DDoS (7256) attack with 21 features. The implemented Performance evaluation revealed that Random Forest algorithm performed best with an accuracy of 99.94% and minimum false positive rate of 0.001%.

[1]  S. Rajalakshmi,et al.  A CLUSTERING ALGORITHM FOR DETECTING DDoS ATTACKS IN NETWORKS , 2009 .

[2]  S. Vijayarani,et al.  Comparative Analysis of Bayes and Lazy Classification Algorithms , 2013 .

[3]  Vahid Ghafori,et al.  New Approach to Mitigate XML-DOS and HTTP-DOS Attacks for Cloud Computing , 2013 .

[4]  Karim Afdel,et al.  Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest , 2018, Secur. Commun. Networks.

[5]  Sankar K. Pal,et al.  Multilayer perceptron, fuzzy sets, and classification , 1992, IEEE Trans. Neural Networks.

[6]  Indraneel Sreeram,et al.  HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm , 2019, Applied Computing and Informatics.

[7]  Samir Kumar Bandyopadhyay,et al.  A tutorial review on Text Mining Algorithms , 2012 .

[8]  Md. Ashad Alam,et al.  PERFORMANCE EVALUATION OF MACHINE LEARNING ALGORITHMS IN ECOLOGICAL DATASET , 2020 .

[9]  Trilok Chand Sharma,et al.  WEKA Approach for Comparative Study of Classification Algorithm , 2013 .

[10]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[11]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[12]  Ghazi Al-Naymat,et al.  Detecting Distributed Denial of Service Attacks Using Data Mining Techniques , 2016 .

[13]  Ruby B. Lee,et al.  Machine Learning Based DDoS Attack Detection from Source Side in Cloud , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[14]  Shahrulniza Musa,et al.  Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach , 2017, J. Comput. Networks Commun..

[15]  G. Aghila,et al.  A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[16]  M. Phil,et al.  Comparative Analysis of Classification Function Techniques for Heart Disease Prediction , 2013 .

[17]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[18]  Balachandra Muniyal,et al.  Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection , 2016 .

[19]  Joseph Stephen Bassi,et al.  Performance Evaluation of Machine Learning Algorithms for Detection and Prevention of Malware Attacks , 2019 .

[20]  Kaushik H. Raviya,et al.  Performance Evaluation of Different Data Mining Classification Algorithm Using WEKA , 2012 .

[21]  Vibhakar Mansotra,et al.  Machine Learning Techniques used for the Detection and Analysis of Modern Types of DDoS Attacks , 2017 .

[22]  Roshan Chitrakar,et al.  DDoS Attack Detection Using Heuristics Clustering Algorithm and Naïve Bayes Classification , 2018 .