Detection of DDoS Attack Using Optimized Machine Learning Technique
()
About this ebook
Network security is any action an organization takes to prevent malicious use or
accidental damage to the network's private data, its users or their devices. The goal of network
security is to keep the network running and safe for all legitimate users.
Security incident response is one key aspect of maintaining organizational
security. A critical task during security incident response is detecting that an incident
has occurred. Detection may occur through reports from end-users and other stakeholders in
the organization, throughdetection analysis performed or it may be accomplished by using
anintrusion detection system. Intrusion Detection (ID) is a challenging endeavor, requiring
security practitioners to have a high level of security expertise and knowledge of their systems
and organization
The demand for the ubiquitous personal communications is driving the development of new
networking techniques. Information security has now become a very important aspect of data
communication as people spend a large amount of time connected to a network. To improve the
security of the data being transmitted various techniques are employed. This chapter
presents background, problem discussion, research challenges, objectives and thesis
organization.
A denial-of-service attack overwhelms a system's resources so thatit
cannot respond to service requests. A DDoS attack is also an attack on system's resources, but it
is launched from a large number of other host machines that are infected by malicious software
controlled by the attacker. There are different types of DoS and DDoS attacks; the most common
are TCP SYN flood attack, teardrop attack, smurf attack, ping-of-death attack and botnets.
Related to Detection of DDoS Attack Using Optimized Machine Learning Technique
Related ebooks
Java Cryptography Extensions: Practical Guide for Programmers Rating: 5 out of 5 stars5/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 0 out of 5 stars0 ratingsTrusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection Rating: 0 out of 5 stars0 ratingsInternet Security: Cryptographic Principles, Algorithms and Protocols Rating: 0 out of 5 stars0 ratingsSecurity for Wireless Ad Hoc Networks Rating: 0 out of 5 stars0 ratingsModern Multithreading: Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs Rating: 0 out of 5 stars0 ratingsWireless Operational Security Rating: 0 out of 5 stars0 ratingsSecurity, Privacy, and Digital Forensics in the Cloud Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsIntelligent Wearable Interfaces Rating: 0 out of 5 stars0 ratingsDSP Applications Using C and the TMS320C6x DSK Rating: 0 out of 5 stars0 ratingsFast and Efficient Context-Aware Services Rating: 0 out of 5 stars0 ratingsJPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures Rating: 0 out of 5 stars0 ratings4G Wireless Video Communications Rating: 0 out of 5 stars0 ratingsSingle and Multi-Chip Microcontroller Interfacing: For the Motorola 6812 Rating: 0 out of 5 stars0 ratingsCoding and Decoding: Seismic Data: The Concept of Multishooting Rating: 0 out of 5 stars0 ratingsDigital Watermarking Rating: 0 out of 5 stars0 ratingsHacking Connected Cars: Tactics, Techniques, and Procedures Rating: 0 out of 5 stars0 ratingsSecure Computer and Network Systems: Modeling, Analysis and Design Rating: 0 out of 5 stars0 ratingsTemporal Data Mining via Unsupervised Ensemble Learning Rating: 0 out of 5 stars0 ratingsData Mining: Multimedia, Soft Computing, and Bioinformatics Rating: 0 out of 5 stars0 ratingsDigital Guide To Developing International Software Rating: 0 out of 5 stars0 ratingsCISM Certified Information Security Manager Study Guide Rating: 0 out of 5 stars0 ratingsFoundations of Microprogramming: Architecture, Software, and Applications Rating: 0 out of 5 stars0 ratingsAdvanced Wireless Networks: Cognitive, Cooperative and Opportunistic 4G Technology Rating: 0 out of 5 stars0 ratingsReliability of Computer Systems and Networks: Fault Tolerance, Analysis, and Design Rating: 0 out of 5 stars0 ratingsComputer Security Rating: 0 out of 5 stars0 ratingsFSM-based Digital Design using Verilog HDL Rating: 0 out of 5 stars0 ratingsData Mining Techniques in Grid Computing Environments Rating: 0 out of 5 stars0 ratings
Intelligence (AI) & Semantics For You
Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Artificial Intelligence: A Guide for Thinking Humans Rating: 4 out of 5 stars4/52084: Artificial Intelligence and the Future of Humanity Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Summary of Super-Intelligence From Nick Bostrom Rating: 5 out of 5 stars5/5101 Midjourney Prompt Secrets Rating: 3 out of 5 stars3/5ChatGPT For Fiction Writing: AI for Authors Rating: 5 out of 5 stars5/5The Secrets of ChatGPT Prompt Engineering for Non-Developers Rating: 5 out of 5 stars5/5Our Final Invention: Artificial Intelligence and the End of the Human Era Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Chat-GPT Income Ideas: Pioneering Monetization Concepts Utilizing Conversational AI for Profitable Ventures Rating: 4 out of 5 stars4/5Midjourney Mastery - The Ultimate Handbook of Prompts Rating: 5 out of 5 stars5/5Discovery Writing with ChatGPT: AI-Powered Storytelling: Three Story Method, #6 Rating: 0 out of 5 stars0 ratingsImpromptu: Amplifying Our Humanity Through AI Rating: 5 out of 5 stars5/5What Makes Us Human: An Artificial Intelligence Answers Life's Biggest Questions Rating: 5 out of 5 stars5/5ChatGPT For Dummies Rating: 0 out of 5 stars0 ratingsThe Algorithm of the Universe (A New Perspective to Cognitive AI) Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsAI for Educators: AI for Educators Rating: 5 out of 5 stars5/5Ways of Being: Animals, Plants, Machines: The Search for a Planetary Intelligence Rating: 4 out of 5 stars4/5The Business Case for AI: A Leader's Guide to AI Strategies, Best Practices & Real-World Applications Rating: 0 out of 5 stars0 ratingsTHE CHATGPT MILLIONAIRE'S HANDBOOK: UNLOCKING WEALTH THROUGH AI AUTOMATION Rating: 5 out of 5 stars5/5
Reviews for Detection of DDoS Attack Using Optimized Machine Learning Technique
0 ratings0 reviews
Book preview
Detection of DDoS Attack Using Optimized Machine Learning Technique - Kalai Vani Y.S
Detection of DDoS Attack Using Optimized Machine Learning Technique
Kalai Vani Y.S
TABLE OF CONTENTS
CHAPTER NO.
LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS
TITLE
PAGE NO.
iv v vii
LIST OF ABBREVIATIONS x
1.0 INTRODUCTION 1
1.1 Research Context 1
1.2 Cyber Threats 2
1.2.1 Denial of Service and Distributed Denial of
2
ServiceAttack
1.2.2 Man-In-the Middle Attack 2
1.2.3 Phishing and Spear Phishing Attack 2
1.2.4 Drive-by-Attack 2
1.2.5 Password Attack 3
1.2.6 SQL Injection Attack. 3
1.3 DISTRIBUTED DENIAL OF SERVICE ATTACK 3
1.3.1 Phases of DDoS Attack 4
1.3.1.1 Connection Consumption Based Attacks 4
1.3.1.2 Bandwidth Consumption Based Attacks 5
1.3.1.3 Vulnerability Exploitation Attacks 6
1.4 INTRUSION DETECTION SYSTEM 7
1.4.1 Host Based IDS (HIDS) 8
1.4.2 Network Based IDS (NIDS) 8
1.4.3 Challenges faced by IDS 9
1.5 NETWORK ANOMALY DETECTION
10
TECHNIQUE
1.5.1 Challenges of Anomaly Detection 11
1.5.2 Taxonomy of Network Anomaly Detection
12
Technique
2.1.4 Privacy Preserving and HDFS Based
25
DDOS AttackDetection System.
2.2 CLASSIFICATION BASED NETWORK
30
ANOMALY DETECTION
2.2.1 Support Vector Machine 30
2.2.2 Bayesian Network 31
2.2.3 Neural Network 31
2.2.4 Rule-Based 32
2.3 STATISTICAL BASED ANOMALY DETECTION 32
2.3.1 Mixture Model 33
2.3.2 Signal Processing Technique 33
2.3.3 Principal Component Analysis 33
2.4 CLUSTERING AND OUTLIER BASED
34
ANOMALYDETECTION
2.4.1 Regular Clustering 35
2.4.2 Co-Clustering 35
2.4.3 Information Theory Based 35
2.4.4 Correlation Analysis 35
2.5 PRIVACY PRESERVATION OF INTRUSION
35
DETECTION TECHNIQUE
2.5.1 Objectives of Cryptographic Algorithms 35
2.5.1.1 Confidentiality 36
2.5.1.2 Authentication 36
2.5.1.3 Integrity 37
2.5.1.4 Availability 37
2.5.1.5 Non-Repudiation 37
2.5.2 Types of Cryptographic Algorithm 37
2.5.2.1 Symmetric Algorithms 37
2.5.2.2 Asymmetric Algorithms 38
2.5.2.3 Hash Functions 39
2.6 RESEARCH GAP 39
2. 7 OBJECTIVES 40
3.0 MATERIALS AND METHODS 41
3.1 INTRUSION DETECTION SYSTEM MODEL 41
3.2 PROPOSED MODEL OF IDS FOR DDOS
43
ATTACKDETECTION
3.2.1 Training Phase 45
3.2.2 Preprocessing 46
3.3 CMFDA BASED WEIGHT OPTIMIZATION
47
FOR DLNN
3.4 DATA CONVERSION 48
3.5 MISSING VALUE REPLACEMENT 48
3.6 ELIMINATING ENTIRE ROWS 48
3.7 PREDICTING THE MISSING VALUES 49
3.8 ESTIMATING AND REPLACING MISSING
49
VALUES
3.9 DATA NORMALIZATION 50
3.10 CLASSIFICATION OF NORMAL AND
52
ATTACK DATAUSING ODLNN
3.10.1 Supervised Machine Learning 52
3.10.2 Unsupervised Machine Learning 52
3.10.3 Semi supervised Machine Learning 52
3.10.4 Reinforcement Learning 53
3.11 NEURAL NETWORK (NN) 53
3.11.1 Optimized Deep Learning Network 54
3.11.2 Weight optimization using CMDFA 57
3.11.3 Testing Phase 63
3.11.4 Encryption of normal data 63
3.11.5 Modified crow search algorithm 65
3.12 CRYPTOGRAPHIC ALGORITHMS 70
3.12.1 Principles of Public Key Cryptosystems 70
3.12.2 Elliptic Curve Cryptography 71
4.0 RESULTS 76
6.0 SUMMARY 102
7.0 CONCLUSION 104
8.0 FUTURE DIRECTIONS 106
9.0
REFERENCES
107
LIST OF TABLES
TABLE NO
TITLE
PAGE NO
2.1 Review using DDOS attack detection using machine 27
learning algorithms
4.1 Precision values for various number of nodes 80
4.2 Recall values obtained for various number of nodes 82
4.3 F-score values obtained for various number of nodes 83
4.4 Accuracy values obtained for varied number of nodes 85
4.5 Values obtained for the metric Encryption time (ms) 86
by the proposed and existing methods for varied Number of Nodes
4.6 Values obtained for the metric Decryption time (ms) 88
by the proposed and existing methods for variedNumber of Nodes
4.7 Memory Usage (kb) of encryption 89
4.8 Memory Usage (kb) of Decryption 91
4.9 FDR values attained by proposed and existing 92
methods
4.10 FNR attained by proposed and existing methods 94
4.11 TPR values attained by proposed and existing 96
methods
TNR values attained by proposed and existing 97
4.12
Methods
LIST OF FIGURES
TABLE NO
TITLE
PAGE NO
1.1 SYN Flood Attack 5
1.2 Bandwidth consumption-based attack 6
1.3 Vulnerability exploitation by slow HTTP attack 7
1.4 Intrusion Detection System 8
1.5
1.6
Displays a generic framework for network 11
anomaly detection
Taxonomy of network anomaly detection 13
techniques
3.1 Proposed Model to detect the DDoS Attack 43
3.2 Representation of DFA 54
3.3 Representation of DLNN 58
4.1 Graphical representation of precision values 81
4.2 Graphical representation of recall values 83
4.3 Graphical representation of F-score values 84
4.4 Graphical representation of Accuracy values 85
4.5 Graphical representation of encryption time (ms) 87
4.6 Graphical representation of decryption time (ms) 89
4.7 Graphical Representation of memory used (kb) 90
by Encryption and Decryption.
4.8 Graphical Representation of FNR by proposed 92
and existing methods.
4.9 Graphical representation of FDR by proposed 93
and existing methods.
4.10 Graphical Representation of FNR by proposed 95
and existing methods.
4.11 Graphical Representation of TPR by the 96
proposed and existing methods.
4.12 Graphical Representation of TNR by the 98
proposed and existing methods.
LIST OF SYMBOLS
mx,n Memory of crow
f (.) Objective function
F Denote its algebraic closure
P ² (F ) Projective plane
E( p(s)) Encrypted plain text
T (e(s)) Time taken to encrypt each record
D(c(s)) Decrypted cipher text
T (d (s)) Time taken to decrypt each record
P1 , P2 Support vectors
C , D Integer elements
A String
LIST OF ABBREVATION
DoS Denial-of-Service
DAG Directed Acyclic Graph DDOS Distributed Denial of Service ECC Elliptic Curve Cryptography
ECDLP Elliptic Curve Discrete Logarithm Problem FAR False Acceptance Rate
FARs False Alarm Rates
FNR False Negative Rate
FPR False Positive Rate
FRR False Rejection Rate
GSO- SVNN
Glowworm Swarm Optimization based Support Vector Neural Network
HCA Heuristics Clustering Algorithm HBOS Histogram Based Outlier Detection HIDS Hybrid Intrusion Detection System
ISO International Organization for Standardization IOT Internet of Things
ID Intrusion Detection
IDS Intrusion Detection System