DDAM: Detecting DDoS Attacks Using Machine Learning Approach

Dealing the Distributed Denial of Service (DDoS) attack is a continuing challenge in the field of network security. An Intrusion Detection System (IDS) is one of the solutions to detect the DDoS attack. The IDS system should always be updated with the attack disincentive to preserve the network security service. In this paper, we propose a new approach for anomaly detection using machine learning to secure the network and to determine the attack patterns. The major contribution is to create real-time dataset and to use the naive Bayes algorithm as a classifier for detecting and comparing its performance with the existing classifiers like random forest and J48 algorithm. The experimental results on the real-time dataset confirm that the proposed machine learning approach can effectively detect network anomalies with high detection rate and low false positive rate.

[1]  Ghazi Al-Naymat,et al.  Detecting Distributed Denial of Service Attacks Using Data Mining Techniques , 2016 .

[2]  Ravneet Kaur,et al.  A survey of data mining and social network analysis based anomaly detection techniques , 2016 .

[3]  Salem Benferhat,et al.  A Naive Bayes Approach for Detecting Coordinated Attacks , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.

[4]  Taisir Eldos,et al.  ON THE KDD'99 DATASET: STATISTICAL ANALYSIS FOR FEATURE SELECTION , 2012 .

[5]  D. Lalitha Bhaskari,et al.  Intrusion Detection Using Random Forests Classifier with SMOTE and Feature Reduction , 2013, 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.

[6]  Pedro M. Domingos,et al.  Beyond Independence: Conditions for the Optimality of the Simple Bayesian Classifier , 1996, ICML.

[7]  P. Amudha,et al.  Performance Analysis of Data Mining Approaches in Intrusion Detection , 2011, 2011 International Conference on Process Automation, Control and Computing.

[8]  Praveen Bhanodia,et al.  Literature survey - IDS for DDoS attacks , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).

[9]  Shahaboddin Shamshirband,et al.  Anomaly Detection using Fuzzy Q-learning Algorithm , 2014 .

[10]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[11]  Leonard E. Trigg,et al.  Technical Note: Naive Bayes for Regression , 2000, Machine Learning.

[12]  Manas Ranjan Patra,et al.  NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .

[13]  Hua Tang,et al.  Machine Learning-based Intrusion Detection Algorithms , 2009 .

[14]  Fengxi Song,et al.  Feature Selection Using Principal Component Analysis , 2010, 2010 International Conference on System Science, Engineering Design and Manufacturing Informatization.

[15]  Vivek Kumar Sharma,et al.  A Decision Tree Algorithm Pertaining to the Student Performance Analysis and Prediction , 2013 .

[16]  Luis Enrique Sucar,et al.  Learning an Optimal Naive Bayes Classifier , 2006, 18th International Conference on Pattern Recognition (ICPR'06).