Abstract
To defend and protect web server from the attack, it is important to know the nature and the behaviour of legitimate and illegitimate clients. It is also important to provide access to the legitimate clients and provide a defence system against illegitimate clients. The Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. By using its application layer protocol DDoS can cause a massive destruction by silently making an entrance to the web server as it act as one of the legitimate clients. The paper uses parameter of the network packet like http GET, POST request and delta time to compute the accuracy in finding out the possible attack. We use different classifiers like Naive Bayes, Naive Bayes Multinomial, Multilayer Perception, RBF network, Random Forest etc. to classify the attack generated dataset. We compare the accuracy, true positive rate, false positive rate of each algorithm by finding the confusion matrix.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
McGregory, S.: Preparing for the next DDoS attack. Netw. Secur. 2013(5), 5–6 (2013). ISSN:1353-4858
Mansfield-Devine, S.: DDoS: threats and mitigation. Netw. Secur. 2011(12), 5–12 (2011). ISSN:1353-4858
Hoque, N., Monowar, H., Bhuyan, R.C., Baishya, D.K., Bhattacharyya, J., Kalita, K.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307–324. ISSN:1084-8045
McGregory, S.: Preparing for the next DDoS attack. Netw. Secur. 2013(5), 5–6 (2013). ISSN:1353-4858
Venkatesan, S., Saleem Basha, M.S., Chellappan, C., Dhavachelvan, A.V.P.: Analysis of accounting models for the detection of duplicate requests in web services. J. King Saud Univers.–Comput. Inform. Sci. 25(1), 7–24 (2013). ISSN:1319-1578
Zhao, D., Traore, I., Sayed, B., Lu, W., Saad, S., Ghorbani, A., Garant, D.: Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39(Part A), 2–16 (2013). ISSN 0167-4048
Soryal, J., Saadawi, T.: IEEE 802.11 DoS attack detection and mitigation utilizing cross layer design. Ad Hoc Netw. 14, 71–83 (2014). ISSN:1570-8705
Muthuprasanna, M., Manimaran, G.: Distributed divide-and-conquer techniques for effective DDoS attack defenses. In: The 28th International Conference on, Distributed Computing Systems, ICDCS ‘08, pp. 93, 102, 17–20 June 2008
Shen, Y.-Y., Fan, F.-Q., Xie, W.-X., Mo, L.-F.: Re-traffic pricing for fighting against DDoS. In: ISECS International Colloquium on, Computing, Communication, Control, and Management, CCCM ‘08, vol. 2, pp. 332, 336, 3–4 Aug 2008
Karrer, R.P., Kuehn, U., Huehn, T.: Joint application and network defense against DDoS flooding attacks in the future internet. In: Second International Conference on, Future Generation Communication and Networking, FGCN’08, vol. 1, pp. 11, 16, 13–15 Dec 2008
Vo, N.H., Pieprzyk, J.: Protecting Web 2.0 Services from Botnet Exploitations. Cybercrime and Trustworthy Computing Workshop (CTC), 2010, vol. 2, pp. 18, 28, 19–20 July 2010
Bermejo, P., Gámez, J.A., Puerta, J.M.: Improving the performance of Naive Bayes multinomial in e-mail foldering by introducing distribution-based balance of datasets. Expert Syst. Appl. 38(3), 2072–2080 (2011). ISSN:0957-4174
Peng, J., Chan, P.P.K.: Revised Naive Bayes classifier for combating the focus attack in spam filtering. In: International Conference on, Machine Learning and Cybernetics (ICMLC), vol. 2, pp. 610, 614, 14–17 July 2013
Zhang, Z., Shao, W., Zhang, H.: A learning algorithm for multilayer perceptron as classifier. In: International Joint Conference on Neural Networks, IJCNN ‘99, vol. 3, pp. 1681, 1684 (1999)
Aung, W.T., Saw Hla, K.H.M.: Random forest classifier for multi-category classification of web pages. In: Services Computing Conference, APSCC 2009. IEEE Asia-Pacific, vol. pp. 372, 376, 7–11 Dec 2009
Xu, R., An, R., Geng, X.F.: Research intrusion detection based PSO-RBF classifier. In: 2011 IEEE 2nd International Conference on, Software Engineering and Service Science (ICSESS), pp. 104, 107, 15–17 July 2011
Kostadinov, D., Bogdanova, S.: Logistic regression classifier for palmprint verification. In: 2012 19th International Conference on, Systems, Signals and Image Processing (IWSSIP), pp. 413, 416, 11–13 April 2012
Huang, J., Lu, J., Ling, C.X.: Comparing naive Bayes, decision trees, and SVM with AUC and accuracy. In: Third IEEE International Conference on, Data Mining, 2003. ICDM 2003, pp. 553, 556, 19–22 Nov 2003
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Singh, K.J., De, T. (2015). An Approach of DDOS Attack Detection Using Classifiers. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2550-8_41
Download citation
DOI: https://doi.org/10.1007/978-81-322-2550-8_41
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2549-2
Online ISBN: 978-81-322-2550-8
eBook Packages: EngineeringEngineering (R0)