Network traffic analysis with machine learning for faster detection of distributed denial of service attack

Document Type : -

Authors

1 Master's student, Shahid Madani University of Azerbaijan, Tabriz, Iran

2 PhD student, Tabriz University, Tabriz, Iran

3 Professor, Tabriz University, Tabriz, Iran

Abstract

With the increasing use of online services, DDoS attacks have been recognized as one of the most serious threats to Internet services. These attacks are able to quickly disrupt online systems and services. In this research, four machine learning algorithms for detecting DDoS attacks have been investigated and analyzed. For this purpose, the Intrusion Detection Evaluation Dataset (CIC-IDS2017) database, which includes botnet traffic samples, has been used. KNN, RF, Naive Bayes, and J48 algorithms were trained using the selected features with the SelectKBest function and the scikit-learn library. The results show that the RF, KNN, and J48 algorithms are very close in terms of accuracy and have performed well in identifying botnet traffic and normal traffic. The RF algorithm with a higher F1-score compared to KNN has provided more accuracy in identifying botnet traffic. On the other hand, the Naive Bayes algorithm, despite its high overall accuracy, has performed poorly in identifying botnet traffic, and its precision and recall are very low for botnet classification. The J48 algorithm has also performed relatively well, but due to the low recall value, a significant part of the attack traffic has been mistakenly identified as normal traffic. This research emphasizes that to deal with DDoS attacks, the use of modern machine learning algorithms can improve the accuracy and speed of identification. In the future, it will be necessary to test the models in real-world conditions with more diverse data in order to increase the accuracy and capabilities of Internet attack detection models.

Keywords

Main Subjects


   [1]      Asadi, M.; BagherI, Z. “Detection of Denial of Service Attacks by Ensemble Learning Method”; Journal of Advanced Defense Science & Technology 14, no. 1. 2023. 51-68 (In Persian). Dor: 20.1001.1.26762935.1402.14.1.5.5
   [2]      Wang, B.; He, Y.; Shui, Z.; Xin, Q.; Lei, H. “Predictive Optimization of DDoS Attack Mitigation in Distributed Systems using Machine Learning”;  Applied and Computational Engineering. 2024, 64, 95-100. DOI:10.54254/2755 2721/64/20241350
   [3]      Mittal, M.; Kumar, K.; Behal, S. “Deep Learning Approaches for Detecting DDoS Attacks: A Systematic Review”; Soft computing. 2023, 27(18), 13039-13075. DOI:10.1007/s00500-021-06608-1
   [4]      Kumari, P.; Jain, A. K. “A Comprehensive Study of DDoS Attacks Over IoT Network and Their Countermeasures”; Computers & Security. 2023, 127, 103096. DOI:10.1016/j.cose.2023.103096
   [5]      Mittal, M.; Kumar, K.; Behal, S. “Deep Learning Approaches for Detecting DDoS Attacks: A Systematic Review”; Soft computing. 2023, 27(18). DOI:10.1007/s00500-021-06608-1
   [6]      Sattari, M. T.; Bagheri, R.; Shirini, K.; Allahverdipour, P. “Modeling Daily and Monthly Rainfall in Tabriz using Ensemble Learning Models and Decision Tree Regression”; Scientific Journal of Golestan University, 2024, 5(18). Doi: 10.30488/CCR.2024.433394.1192
   [7]      Saleh Esfehani, M.; Abo Ali, M. “An IDS for Detection of Active Attacks Against Routing in Mobile Ad Hoc Networks”; Journal of Advanced Defense Science & Technology 1, no. 1. 2010, 15-22 (In Persian). Dor: 20.1001.1.26762935.1389.1.1.2.1
   [8]      Behal, S.; Kumar, K. “Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review”; Int. J. Netw. Secur. 2017, 19(3). DOI: 10.6633/IJNS.201703.19(3).07)
   [9]      Michelena, Á,; Aveleira‐Mata, J.; Jove, E.; Bayón‐Gutiérrez, M.; Novais, P.; Romero, O. F.; Aláiz‐Moretón, H. “A novel intelligent approach for man‐in‐the‐middle attacks detection over internet of things environments based on message queuing telemetry transport”; Expert Systems. 2024, 41(2), e13263. DOI:10.1111/exsy.13263.
[10]      Choorod, P.; George, W.; Anil Fernando. “Classifying tor traffic encrypted payload using machine learning”; IEEE Access. 2024. DOI: 10.1109/ACCESS.2024.3356073
[11]      Priya, S. S.; Sivaram, M.; Yuvaraj, D.; Jayanthiladevi, A. “Machine Learning Based DDoS Detection”; In  international conference on emerging smart computing and informatics. 2020,234-237. DOI: 10.1109/ESCI48226.2020.9167642
[12]      Kazemitabar, J.; Taheri, R.; Kheradmandian, H. “A Novel Technique for Improvement of Intrusion Detection via Combining Random Forrest and Genetic Algorithm”; 2019, 287-296 (In Persian). Dor: 20.1001.1.26762935.1398.10.3.9.5
[13]      Das, S.; Mahfouz, A. M.; Venugopal, D.; Shiva, S. “DDoS Intrusion Detection Through Machine Learning Ensemble”; IEEE 19th international conference on software Quality, Reliability and Security Companion. 2019, 471-477. DOI: 10.1109/QRS-C.2019.00090 
[14]      Asgharian, H.; Ahmad A.; Raahemi, B. “Engineered Feature Set to Detect Flooding Attacks in SIP Based VoIP’; Journal of Advanced Defense Science & Technology 8, no. 1. 2019: 61-69 (In Persian). Dor: 20.1001.1.26762935.1396.8.1.7.5
[15]      Pande, S.; Khamparia, A.; Gupta, D.; Thanh, D. N. “DDOS Detection Using Machine Learning Technique”; Recent Studies on Computational Intelligence: Doctoral Symposium on Computational Intelligence, Springer Singapore. 2021, 59-68. DOI:10.1007/978-981-15-8469-5_5
[16]      Abdulla, N. N.; Hasoun, R. K. “Review of Detection Denial of Service Attacks Using Machine Learning Through Ensemble Learning”; Iraqi Journal for Computers and Informatics. 2022, 48(1), 13-20. DOI:10.25195/ijci.v48i1.349 
[17]      Sattari, M. T.; Shirini, K.; Javidan, S.” Evaluating the efficiency of dimensionality reduction methods in improving the accuracy of water quality index modeling using machine learning algorithms”; Water and Soil Management and Modelling. 2024,4(2), 89-104. DOI: 10.22098/mmws.2023.12434.1241
  • Receive Date: 18 October 2023
  • Revise Date: 11 December 2023
  • Accept Date: 25 December 2023
  • Publish Date: 21 January 2024