A Novel Hybrid Approach for Detection of DDoS Attack

  • Pooja Redekar
  • Madhumita ChatterjeeEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


The Distributed denial of service (DDoS), special type of denial of service attack, has become one of the major threats to the internet. Assailants perform DDoS assault by coordinating countless sources to send futile activity to the casualty in this manner upsetting typical administrations. The risk of DDoS assaults has turned out to be much more serious as aggressors can trade off a colossal number of PCs by utilizing vulnerabilities in prominent working frameworks. With the Internet of Things in place the DDoS attack will have an enormous attack surfaces available to unleash its full potential. Due to its nature, DDoS prevention is not guaranteed. Attack detection be the next step of defense. The developed system uses hybrid approach, that is, combining two approaches, namely misuse-based and anomaly-based detection. The results achieved by the developed system are discussed in this paper.


DDoS attack Anomaly-based detection Misuse-based detection Hybrid detection approach 


  1. 1.
    Nazrul, H., Dhruba, B., Jugal, K.: A novel measure for low-rate and high- rate DDoS attack detection using multivariate data analysis. In: IEEE COMSNETS 2016-Poster Track (2016)Google Scholar
  2. 2.
    Zhiyuan, T., Aruna, J., Xiangjian, H., Priyadarsi, N., Ren, P.L.: A system for Denial-of-Service Attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 25(2), 447–456 (2014)CrossRefGoogle Scholar
  3. 3.
    Komal, M., Pramod, G.: A Survey on Effective way of Detecting Denial-of-Service attack using Multivariate Correlation Analysis. iCATccT (2015)Google Scholar
  4. 4.
    Özge, C., Saliha, B., Güneş, K.: Hybrid Intrusion Detection System for DDoS Attacks, Journal of Electrical and Computer Engineering (2015)Google Scholar
  5. 5.
    Alan, S., Richard, O., Tomasz, R.: Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing 172, 385–393 (2016)CrossRefGoogle Scholar
  6. 6.
    İlker, O., Richard, B.: Cusum-Entropy: An efficient method for DDoS attack detection. IEEE (2016)Google Scholar
  7. 7.
    Xi, Q., Tongge, X., Chao, W.: DDoS Attack Detection using Flow Entropy and Clustering Technique. ICCIS (2015)Google Scholar
  8. 8.
    Dhruba, B., Jugal, K.: Network Anomaly Detection-Machine Learning perspectiveGoogle Scholar
  9. 9.
    Manohar, M.T.B., Jyothi, M.E., Rajani, M.B., Kumar, M.I.R.: A Novel Entropy Based Detection of DDoS AttacksGoogle Scholar
  10. 10.
    Félix, I., Tanja, Z.: Analysis of Network Traffic Features for Anomaly Detection. Springer (2015)Google Scholar
  11. 11.
    Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection DatasetsGoogle Scholar
  12. 12.
    Manjari, S., Sekhar, K.R.: DDoS Counter Measures Based on Snort’s detection system. IJDCST (2013)Google Scholar
  13. 13.
  14. 14.
  15. 15.
    Geoffrey, M.: Mahalanobis Distance (1999)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer EngineeringPCENew PanvelIndia

Personalised recommendations