Detection DDOS Attacks Using Machine Learning Methods

Wishing to communicate each other of people contributes to improve technology and it has made the internet concept an indispensable part of our daily life. Cyber attacks that are from extranets to enterprise network or intranets which are used as personal can cause to pecuniary loss and intangible damages. It is critical to take due precautions for minimizing the losses by early detection of attacks. The aim of this study is analyzing the rate of success in intrusion detection system by using different methods. In this study, CICDDoS2019 data set has been used and DDOS attacks in this data set were compared and the success rates of threat determination were analysed as using Artificial Neural Networks (ANN), Support Vector Machine (SVM), Gaussian Naive Bayes, Multinomial Naive Bayes, Bernoulli Naive Bayes, Logistic Regression, K-nearest neighbor (KNN), Decision Tree (entropy-gini) and Random Forest algorithms. It has been seen that the highest of the success rate is the models which ensures almost 100% success that were made by using K-nearest neighbor, Logistic Regression, Naive Bayes, (Multinomial – Bernoulli algorithms)

___

1. Ü. Çavuşoğlu, S. Kaçar, "Anormal Trafik Tespiti için Veri Madenciliği Algoritmalarının Performans Analizi", Akademik Platform Mühendislik ve Fen Bilimleri Dergisi, vol. 7, no. 2, pp. 205-216, 2019.

2. S. Özekes, E. N. Karakoç, "Makine Öğrenmesi Yöntemleriyle Anormal Ağ Trafiğinin Tespit Edilmesi", Düzce Üniversitesi Bilim ve Teknoloji Dergisi, vol. 7, no. 1, pp. 566-576, 2019.

3. E. Öztemel, "Yapay Sinir Ağları", Papatya Yayıncılık, İstanbul, Turkey, 2006.

4. S. K. Ajagekar, V. Jadhav, "Study on Web DDOS Attacks Detection Using Multinomial Classifier" International Conference on Computational Intelligence and Computing Research (ICCIC), 2016, pp. 1-5.

5. R. Atay, D. E. Odabaş, M. K. Pehlivanoğlu, "İki Seviyeli Hibrit Makine Öğrenmesi Yöntemi ile Saldırı Tespiti", Gazi Mühendislik Bilimleri Dergisi, vol. 5, no. 3, pp. 258-272, 2019.

6. M. Belgiu, L. Draguţ, "Random Forest in Remote Sensing: A Review of Applications and Future Direction", ISPRS Journal of Photogrammetry and Remote Sensing, vol. 114, pp. 24-31, 2016.

7. Canadian Institute for Cybersecurity, DDoS Evaluation Dataset (CICDDoS2019), 2019. Available: https://www.unb.ca/cic/datasets/ddos-2019.html

8. D. Evans, "The Internet of Things How the Next Evolution of the Internet Is Changing Everything", CISCO, 2011.

9. E. Hatipoğlu, "Machine Learning — Classification — Naive Bayes — Part 11", Medium, 2018. Available: https://medium. com/@ekrem.hatipoglu/machine-learning-classification-naive-bayes-part-11-4a10cd3452b4

10. İTUBİDB, "Saldırı Tespit Sistemleri", 2013. Available: https://bidb. itu.edu.tr/seyir-defteri/blog/2013/09/07/sald%C4%B1r%C4%B1- tespit-sistemleri

11. R. Kraur, M. Singh, "Efficient Hybrid Technique for Detecting Zero-Day Polymorphic", In 2014 IEEE International Advance Computing Conference, 2014.

12. IACC, IEEE, pp. 95-100.

13. M. Panda, P. M. Ranjan, "Network Insrusipn Detection Using Naive Bayes". International Journal of Computer Science and Network Security, vol. 7, no. 12, pp. 258-263, 2007.

14. Ş. Sağıroğlu, E. N. Yolaçan, U. Yavanoğlu, "Zeki Saldırı Tespit Sistemi Tasarımı ve Gerçekleştirilmesi", Journal of the Faculty of Engineering & Architecture of Gazi University, vol. 26, no. 2, pp. 325-340, 2011.

15. I. Sharafaldin, A. H. Lashkari, S. Hakak, A. A. Ghorbani, "Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy", 2019 International Carnahan Conference on Security Technology (ICCST), Chennai: IEEE, 2019, pp. 1-8).

16. H. Tanrıkulu, M. H. Sazlı, "Saldırı Tespit Sistemlerinde Yapay Sinir Ağlarının Kullanılması", 2007.

17. UNB, "DDoS Evaluation Dataset (CICDDoS2019)", 2019. Available: https://www.unb.ca/cic/datasets/ddos-2019.html

18. A. R. Wani, Q. P. Rana, U. Saxena, N. Pandey, "Analysis and Detection of DDoS Attacks on Cloud Computing Environment using Machine Learning Techniques", 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai: IEEE, pp. 870-875, 2019.

19. M. M. Zulkernine, "A Neural Network Based System for Intrusion Detection and Classification of Attacks", Natural Sciences and Eng Research Council of Canada (NSERC) Reports, 148-04, 2004.