SEMI-SUPERVISED MACHINE LEARNING APPROACH FOR DDOS DETECTION
DOI:
https://doi.org/10.61841/t2ry7x66Keywords:
Distributed Denial of Service (DDoS), Malware Detection, Machine learning, NLP Method, Text semantics.Abstract
Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. Moreover, attackers these days do not need to be highly skilled to perpetrate an attack. Tools for orchestrating an attack can easily be found online and require little to no knowledge about attack scripts to initiate an attack. The purpose of this paper is to detect and mitigate known and unknown DDoS attacks in real time environments. Identify high volume of genuine traffic as genuine without being dropped. Prevent DDoS attacking (forged) packets from reaching the target while allowing genuine packets to get through. A DDoS attack slows or halts communications between devices as well as the victim machine itself. It introduces loss of Internet services like email, online applications or programme performance. We apply an automatic characteristic selection algorithm primarily based on N-gram sequence to obtain meaningful capabilities from the semantics of site visitors flows. DDoS attacks are the perfect planned attacks with the aim to stop the legitimate users from accessing the system or the service by consuming the bandwidth or by making the system or service unavailable. The attackers do not attack to steal or access any information but they decline the performance of the network and the system.
Downloads
References
[1] C. Rossow, “Amplification hell: revisiting network protocols for DDoS abuse,” in Symposium on Network and Distributed System Security (NDSS), Feb. 2014.
[2] F.-Y. Lee and S. Shieh, “Defending against spoofed DDoS attacks with path fingerprint,” Comput. Sec., Vol. 24, no. 7, pp. 571–586, Oct. 2005.
[3] . Bhuyan MH, Bhattacharyya DK, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate ddos attack detection.
[4] Pattern Recogn Lett 51:1–7 2. Lin S-C, Tseng S-S (2004) Constructing detection knowledge for ddos intrusion tolerance. Exp Syst Appl 27(3):379–390 3.
[5] Chang RKC (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag 40(10):42–51
[6] Yu S (2014) Distributed denial of service attack and defense. Springer, Berlin
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.