SEMI-SUPERVISED MACHINE LEARNING APPROACH FOR DDOS DETECTION

Authors

  • CHERUKU MURALI KRISHNA Assistant Professor, Assistant professor, Assistant professor, Department of CSE, Samskruti College of Engineering and Technology, Ghatkesar. Author
  • SIRIKONDA VAMSHI KRISHNA Assistant Professor, Assistant professor, Assistant professor, Department of CSE, Samskruti College of Engineering and Technology, Ghatkesar. Author
  • KONDA REDDY SUNIL Assistant Professor, Assistant professor, Assistant professor, Department of CSE, Samskruti College of Engineering and Technology, Ghatkesar. Author

DOI:

https://doi.org/10.61841/t2ry7x66

Keywords:

Distributed Denial of Service (DDoS), Malware Detection, Machine learning, NLP Method, Text semantics.

Abstract

Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. Moreover, attackers these days do not need to be highly skilled to perpetrate an attack. Tools for orchestrating an attack can easily be found online and require little to no knowledge about attack scripts to initiate an attack. The purpose of this paper is to detect and mitigate known and unknown DDoS attacks in real time environments. Identify high volume of genuine traffic as genuine without being dropped. Prevent DDoS attacking (forged) packets from reaching the target while allowing genuine packets to get through. A DDoS attack slows or halts communications between devices as well as the victim machine itself. It introduces loss of Internet services like email, online applications or programme performance. We apply an automatic characteristic selection algorithm primarily based on N-gram sequence to obtain meaningful capabilities from the semantics of site visitors flows. DDoS attacks are the perfect planned attacks with the aim to stop the legitimate users from accessing the system or the service by consuming the bandwidth or by making the system or service unavailable. The attackers do not attack to steal or access any information but they decline the performance of the network and the system.

Downloads

Download data is not yet available.

References

[1] C. Rossow, “Amplification hell: revisiting network protocols for DDoS abuse,” in Symposium on Network and Distributed System Security (NDSS), Feb. 2014.

[2] F.-Y. Lee and S. Shieh, “Defending against spoofed DDoS attacks with path fingerprint,” Comput. Sec., Vol. 24, no. 7, pp. 571–586, Oct. 2005.

[3] . Bhuyan MH, Bhattacharyya DK, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate ddos attack detection.

[4] Pattern Recogn Lett 51:1–7 2. Lin S-C, Tseng S-S (2004) Constructing detection knowledge for ddos intrusion tolerance. Exp Syst Appl 27(3):379–390 3.

[5] Chang RKC (2002) Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE Commun Mag 40(10):42–51

[6] Yu S (2014) Distributed denial of service attack and defense. Springer, Berlin

Downloads

Published

30.06.2020

How to Cite

KRISHNA, C. M., KRISHNA, S. V., & SUNIL, K. R. (2020). SEMI-SUPERVISED MACHINE LEARNING APPROACH FOR DDOS DETECTION. International Journal of Psychosocial Rehabilitation, 24(6), 18887-18897. https://doi.org/10.61841/t2ry7x66