Distributed Denial-of-Service Attack by SVM and KNN using Hybrid Machine Learning Techniques
DOI:
https://doi.org/10.32628/IJSRSET207463Keywords:
Distributed denial of services (DDoS), Ping(ICMP) attack, Machine learning classifiers, Security, Intrusion detection, Prediction, support vector machine (SVM), k-nearest neighbor (KNN), KNN-SVMAbstract
DDoS attacks are primary concern in internet security today. A distributed denial-of-service is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer system as sources of attack traffic. DDoS attacks in ICMP protocol is called as ICMP flood attack where the attacker attempts to overwhelm a targeted device with ICMP echo-request packets, causing the target to become inaccessible to normal traffic. This type of attack is also known as Ping(ICMP) Flood attack.Fast detection of the DDoS attack, quick response mechanisms and proper mitigation must be done. An investigation has been performed on DDoS attack and it analyzes the details of its phase using machine learning technique to classify the network status. In this paper, we propose a hybrid KNN-SVM method on classifying, detecting and predicting the DDoS attack.
References
- V. Deepa, K. Muthamil Sudar, P.Deepalakshmi3 et al. " Detection of DDoS Attack on SDN Control plane using Hybrid Machine Learning Techniques" Proceedings of the IEEE (ICSSIT 2018).. IEEE Xplore Part Number: CFP18P17-ART; ISBN:978-1-5386-5873-4
- SHI DONG AND MUDAR SAREM " DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks." ReceivedDecember2,2019,acceptedDecember22,2019,dateofpublicationDecember30,2019,dateofcurrentversionJanuary8,2020.
- Yavuz CANBAY and Seref SAGIROGLU, “A Hybrid Method for Intrusion Detection” In IEEE 14th International Conference on Machine Learning andApplications”,2015.
- “Ahmed badawy,surseh babu and jamie ball ” A hybrid knn/svm algorithm for classification of data”publication at researchgate.net feb 2019
- Saurav Nanda, Faheem Zafari, CasimerDeCusatis, Eric Wedaa and Baijian Yang, “Predicting Network Attack Patterns in SDN using Machine Learning Approach”, In IEEE Conference on Network Virtualization and Software Defined Networks (NFV- SDN),2016.
- Gisung Kim, Seungmin Lee, Sehun Kim “A novel hybrid attack detection method integrating anomaly detection with misuse detection”, - journal on Expert Systems with Applications – Online ].
- Niyaz, Quamar, Weiqing Sun, and Ahmad Y. Javaid. "A deep learning based DDoS detection system in software-defined networking (SDN)." arXiv preprint arXiv:1611.07400(2016).
- Barki, Lohit, et al. "Detection of distributed denial of service attacks in software defined networks." Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on. IEEE,2016.
- The most popular types of DNS attacks. Online]. Available: https://securitytrails.com/blog/most-popular-types-dns-attacks (visited on 01/06/2020).
- D. Smith, Portmapper is preying on misconfigured servers to amplify attacks, Sep. 2015. Online]. Available: https://blog.radware.com/security/2015/09/portmapper-preying-on-serve rs/ (visited on 01/25/2020).
- Akamai, Attackers using new MS SQL reflection techniques, Feb. 2015. Online]. Available: https://blogs.akamai.com/2015/02/plxsert- warns- of- ms- sql- reflection- attacks.html (visited on 01/08/2020).
- J. M. Alonso, R. Bordon, M. Beltran, and A. Guzman, “LDAP injection techniques,” in IEEE Singapore International Conference on Communication Systems, Guangzhou, China, Nov.2008, pp. 980–986.
- Microsoft, MS03-034: Flaw in NetBIOS could lead to information disclosure, Sep. 2019. On-line]. Available: https://support.microsoft.com/en-us/help/824105/ms03-034-flaw-i n-netbios-could-lead-to-information-disclosure (visited on 01/16/2020).Cloudflare, NTP amplification DDoS attack. Online]. Available: https://www.cloudflare
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.