Skip to main content

An Approach of DDOS Attack Detection Using Classifiers

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications

Abstract

To defend and protect web server from the attack, it is important to know the nature and the behaviour of legitimate and illegitimate clients. It is also important to provide access to the legitimate clients and provide a defence system against illegitimate clients. The Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. By using its application layer protocol DDoS can cause a massive destruction by silently making an entrance to the web server as it act as one of the legitimate clients. The paper uses parameter of the network packet like http GET, POST request and delta time to compute the accuracy in finding out the possible attack. We use different classifiers like Naive Bayes, Naive Bayes Multinomial, Multilayer Perception, RBF network, Random Forest etc. to classify the attack generated dataset. We compare the accuracy, true positive rate, false positive rate of each algorithm by finding the confusion matrix.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. McGregory, S.: Preparing for the next DDoS attack. Netw. Secur. 2013(5), 5–6 (2013). ISSN:1353-4858

    Google Scholar 

  2. Mansfield-Devine, S.: DDoS: threats and mitigation. Netw. Secur. 2011(12), 5–12 (2011). ISSN:1353-4858

    Google Scholar 

  3. Hoque, N., Monowar, H., Bhuyan, R.C., Baishya, D.K., Bhattacharyya, J., Kalita, K.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307–324. ISSN:1084-8045

    Google Scholar 

  4. McGregory, S.: Preparing for the next DDoS attack. Netw. Secur. 2013(5), 5–6 (2013). ISSN:1353-4858

    Google Scholar 

  5. Venkatesan, S., Saleem Basha, M.S., Chellappan, C., Dhavachelvan, A.V.P.: Analysis of accounting models for the detection of duplicate requests in web services. J. King Saud Univers.–Comput. Inform. Sci. 25(1), 7–24 (2013). ISSN:1319-1578

    Google Scholar 

  6. Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39(Part A), 2–16 (2013). ISSN 0167-4048

    Google Scholar 

  7. Soryal, J., Saadawi, T.: IEEE 802.11 DoS attack detection and mitigation utilizing cross layer design. Ad Hoc Netw. 14, 71–83 (2014). ISSN:1570-8705

    Google Scholar 

  8. Muthuprasanna, M., Manimaran, G.: Distributed divide-and-conquer techniques for effective DDoS attack defenses. In: The 28th International Conference on, Distributed Computing Systems, ICDCS ‘08, pp. 93, 102, 17–20 June 2008

    Google Scholar 

  9. Shen, Y.-Y., Fan, F.-Q., Xie, W.-X., Mo, L.-F.: Re-traffic pricing for fighting against DDoS. In: ISECS International Colloquium on, Computing, Communication, Control, and Management, CCCM ‘08, vol. 2, pp. 332, 336, 3–4 Aug 2008

    Google Scholar 

  10. Karrer, R.P., Kuehn, U., Huehn, T.: Joint application and network defense against DDoS flooding attacks in the future internet. In: Second International Conference on, Future Generation Communication and Networking, FGCN’08, vol. 1, pp. 11, 16, 13–15 Dec 2008

    Google Scholar 

  11. Vo, N.H., Pieprzyk, J.: Protecting Web 2.0 Services from Botnet Exploitations. Cybercrime and Trustworthy Computing Workshop (CTC), 2010, vol. 2, pp. 18, 28, 19–20 July 2010

    Google Scholar 

  12. Bermejo, P., Gámez, J.A., Puerta, J.M.: Improving the performance of Naive Bayes multinomial in e-mail foldering by introducing distribution-based balance of datasets. Expert Syst. Appl. 38(3), 2072–2080 (2011). ISSN:0957-4174

    Google Scholar 

  13. Peng, J., Chan, P.P.K.: Revised Naive Bayes classifier for combating the focus attack in spam filtering. In: International Conference on, Machine Learning and Cybernetics (ICMLC), vol. 2, pp. 610, 614, 14–17 July 2013

    Google Scholar 

  14. Zhang, Z., Shao, W., Zhang, H.: A learning algorithm for multilayer perceptron as classifier. In: International Joint Conference on Neural Networks, IJCNN ‘99, vol. 3, pp. 1681, 1684 (1999)

    Google Scholar 

  15. Aung, W.T., Saw Hla, K.H.M.: Random forest classifier for multi-category classification of web pages. In: Services Computing Conference, APSCC 2009. IEEE Asia-Pacific, vol. pp. 372, 376, 7–11 Dec 2009

    Google Scholar 

  16. Xu, R., An, R., Geng, X.F.: Research intrusion detection based PSO-RBF classifier. In: 2011 IEEE 2nd International Conference on, Software Engineering and Service Science (ICSESS), pp. 104, 107, 15–17 July 2011

    Google Scholar 

  17. Kostadinov, D., Bogdanova, S.: Logistic regression classifier for palmprint verification. In: 2012 19th International Conference on, Systems, Signals and Image Processing (IWSSIP), pp. 413, 416, 11–13 April 2012

    Google Scholar 

  18. Huang, J., Lu, J., Ling, C.X.: Comparing naive Bayes, decision trees, and SVM with AUC and accuracy. In: Third IEEE International Conference on, Data Mining, 2003. ICDM 2003, pp. 553, 556, 19–22 Nov 2003

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Singh, K.J., De, T. (2015). An Approach of DDOS Attack Detection Using Classifiers. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2550-8_41

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2550-8_41

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2549-2

  • Online ISBN: 978-81-322-2550-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics