• DocumentCode
    1780366
  • Title

    An impact analysis: Real time DDoS attack detection and mitigation using machine learning

  • Author

    Kiruthika Devi, B.S. ; Preetha, G. ; Selvaram, G. ; Shalinie, S. Mercy

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Anna Univ., Madurai, India
  • fYear
    2014
  • fDate
    10-12 April 2014
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Distributed Denial of service (DDoS) attacks is the most devastating attack which tampers the normal functionality of critical services in internet community. DDoS cyber weapon is highly motivated by several aspects including hactivitism, personal revenge, anti-government force, disgruntled employers/customers, ideological and political cause, cyber espionage and so on. IP spoofing is the powerful technique used by attackers to disrupt the availability of services in the internet network by impersonating as a trusted source. Since the spoofed traffic shares the same resources as that of the legitimate one´s detection and filtering becomes very essential. The proposed model consists of online monitoring system (OMS), spoofed traffic detection module and interface based rate limiting (IBRL) algorithm. OMS provides DDoS impact measurements in real time by monitoring the degradation in host and network performance metrics. The spoofed traffic detection module incorporates hop count inspection algorithm (HCF) to check the authenticity of incoming packet by means of source IP address and its corresponding hops to destined victim. HCF coupled with support vector machine (SVM) provides 98.99% accuracy with reduced false positive. Followed with, IBRL algorithm restricts the traffic aggregates at victim router when exceeding system limits in order to provide sufficient bandwidth for remaining flows.
  • Keywords
    IP networks; Internet; computer network performance evaluation; computer network security; learning (artificial intelligence); support vector machines; DDoS cyber weapon; HCF; IBRL algorithm; IP spoofing; Internet community; Internet network; OMS; SVM; antigovernment force; cyber espionage; devastating attack; disgruntled employers; distributed denial of service attacks; hactivitism; hop count inspection algorithm; impact analysis; interface based rate limiting algorithm; machine learning; network performance metrics; normal functionality; online monitoring system; personal revenge; real time DDoS attack detection; real time DDoS attack mitigation; source IP address; spoofed traffic detection module; spoofed traffic shares; support vector machine; Aggregates; Computer crime; Filtering; IP networks; Limiting; Measurement; Support vector machines; DDoS; IP spoofing; hop count inspection algorithm; rate limiting; support vector machine;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Recent Trends in Information Technology (ICRTIT), 2014 International Conference on
  • Conference_Location
    Chennai
  • Type

    conf

  • DOI
    10.1109/ICRTIT.2014.6996133
  • Filename
    6996133