Enhancing Cybersecurity Against DDOS Attacks Evaluating Supervised Machine Learning Techniques
DOI:
https://doi.org/10.21108/ijoict.v10i1.964Keywords:
Cyber attacks, Machine learning, Intrusion Detection System.Abstract
An individual or group launches a cyber attack when they intentionally try to get into another person's or group's computer system. Typically, the goal of an attacker is to gain an advantage by interfering with the victim's network. Now that COVID-19 has wreaked havoc on businesses throughout the world, it's cybercriminals' ideal storm. When it comes to cyber threats, Distributed Denial-Of-Service attacks (DDoS) are the most common and dangerous for corporate networks, apps, and services. Distributed denial of service attacks aim to flood a server, service, or network with malicious traffic in an effort to interrupt regular traffic. Financial losses, decreased productivity, damaged brands, worse credit and insurance ratings, damaged relationships with suppliers and customers, and IT budget overruns are all possible outcomes. Developing Network Intrusion Detection Systems (NIDSs) that can reliably foretell DDoS attacks is an urgent issue. This study used the CICDDoS2019 dataset to assess supervised Machine Learning (ML) methods. The machine learning algorithms that were assessed include AdaBoost, Naïve Bayes, MLP-ANN, Random Forest, and SVM. We use the assessment metrics: Area Under the Curve (AUC), Accuracy, F-measure, Precision, and Recall. This study demonstrates that of the algorithms tested, AdaBoost shows the highest promise in detecting DDoS attacks
Downloads
References
2. Alfatemi, A., Rahouti, M., Amin, R., ALJamal, S., Xiong, K., & Xin, Y. (2024). Advancing DDoS Attack Detection: A Synergistic Approach Using Deep Residual Neural Networks and Synthetic Oversampling. arXiv preprint arXiv:2401.03116.
3. Ali, M., Shahroz, M., Mushtaq, M. F., Alfarhood, S., Safran, M., & Ashraf, I. (2024). Hybrid Machine Learning Model for Efficient Botnet Attack Detection in IoT Environment. IEEE Access.
4. Aslam, N., Srivastava, S., & Gore, M. M. (2024). A comprehensive analysis of machine learning-and deep learning-based solutions for DDoS attack detection in SDN. Arabian Journal for Science and Engineering, 49(3), 3533-3573.
5. Benmohamed, E., Thaljaoui, A., Elkhediri, S., Aladhadh, S., & Alohali, M. (2024). E-SDNN: encoder-stacked deep neural networks for DDOS attack detection. Neural Computing and Applications, 1-13.
6. Bukhowah, R., Aljughaiman, A., & Rahman, M. H. (2024). Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions. Electronics, 13(6), 1031.
7. Das, S., Ashrafuzzaman, M., Sheldon, F. T., & Shiva, S. (2024). Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks. Algorithms, 17(3), 99.
8. Gadallah, W. G., Ibrahim, H. M., & Omar, N. M. (2024). A deep learning technique to detect distributed denial of service attacks in software-defined networks. Computers & Security, 137, 103588.
9. Hekmati, A., & Krishnamachari, B. (2024). Graph-Based DDoS Attack Detection in IoT Systems with Lossy Network. arXiv preprint arXiv:2403.09118.
10. Naqvi, S. S. A., Li, Y., & Uzair, M. (2024). DDoS attack detection in smart grid network using reconstructive machine learning models. PeerJ Computer Science, 10, e1784.
11. Saiyed, M. F., & Al-Anbagi, I. (2024). A Genetic Algorithm-and t-Test-Based System for DDoS Attack Detection in IoT Networks. IEEE Access, 12, 25623-25641.
12. Salama, A. M., Mohamed, M. A., & AbdElhalim, E. (2024). Enhancing Network Security in IoT Applications through DDoS Attack Detection Using ML. Mansoura Engineering Journal, 49(3), 10.
13. Setia, H., Chhabra, A., Singh, S. K., Kumar, S., Sharma, S., Arya, V., ... & Wu, J. (2024). Securing the road ahead: Machine learning-driven DDoS attack detection in VANET cloud environments. Cyber Security and Applications, 2, 100037.
14. Shaikh, J., Butt, Y. A., & Naqvi, H. F. (2024). Effective Intrusion Detection System Using Deep Learning for DDoS Attacks. The Asian Bulletin of Big Data Management, 4(1).
Downloads
Published
How to Cite
Issue
Section
License
Manuscript submitted to IJoICT has to be an original work of the author(s), contains no element of plagiarism, and has never been published or is not being considered for publication in other journals. Author(s) shall agree to assign all copyright of published article to IJoICT. Requests related to future re-use and re-publication of major or substantial parts of the article must be consulted with the editors of IJoICT.