Title :
An impact analysis: Real time DDoS attack detection and mitigation using machine learning
Author :
Kiruthika Devi, B.S. ; Preetha, G. ; Selvaram, G. ; Shalinie, S. Mercy
Author_Institution :
Dept. of Comput. Sci. & Eng., Anna Univ., Madurai, India
Abstract :
Distributed Denial of service (DDoS) attacks is the most devastating attack which tampers the normal functionality of critical services in internet community. DDoS cyber weapon is highly motivated by several aspects including hactivitism, personal revenge, anti-government force, disgruntled employers/customers, ideological and political cause, cyber espionage and so on. IP spoofing is the powerful technique used by attackers to disrupt the availability of services in the internet network by impersonating as a trusted source. Since the spoofed traffic shares the same resources as that of the legitimate one´s detection and filtering becomes very essential. The proposed model consists of online monitoring system (OMS), spoofed traffic detection module and interface based rate limiting (IBRL) algorithm. OMS provides DDoS impact measurements in real time by monitoring the degradation in host and network performance metrics. The spoofed traffic detection module incorporates hop count inspection algorithm (HCF) to check the authenticity of incoming packet by means of source IP address and its corresponding hops to destined victim. HCF coupled with support vector machine (SVM) provides 98.99% accuracy with reduced false positive. Followed with, IBRL algorithm restricts the traffic aggregates at victim router when exceeding system limits in order to provide sufficient bandwidth for remaining flows.
Keywords :
IP networks; Internet; computer network performance evaluation; computer network security; learning (artificial intelligence); support vector machines; DDoS cyber weapon; HCF; IBRL algorithm; IP spoofing; Internet community; Internet network; OMS; SVM; antigovernment force; cyber espionage; devastating attack; disgruntled employers; distributed denial of service attacks; hactivitism; hop count inspection algorithm; impact analysis; interface based rate limiting algorithm; machine learning; network performance metrics; normal functionality; online monitoring system; personal revenge; real time DDoS attack detection; real time DDoS attack mitigation; source IP address; spoofed traffic detection module; spoofed traffic shares; support vector machine; Aggregates; Computer crime; Filtering; IP networks; Limiting; Measurement; Support vector machines; DDoS; IP spoofing; hop count inspection algorithm; rate limiting; support vector machine;
Conference_Titel :
Recent Trends in Information Technology (ICRTIT), 2014 International Conference on
Conference_Location :
Chennai
DOI :
10.1109/ICRTIT.2014.6996133