Detection of DDoS Attack Using UCLA Dataset on Different Classifiers
Keywords:
DDoS attack, Internet Securities, Attack PacketAbstract
Distributed denial of service attack have strong Impact on security of internet because these attacks affects the normal functioning causing loss of billions of dollars. DDoS is very harmful to network as it delays the legitimate users from excessing the server. However these networks were well equipped in security yet they were damaged by DDoS attack. In this paper, the proposed system presents both detecting and classifying schemes of DDoS attack using K-NN, SVM and Naïve Bayesian. The algorithms are developed by using various features of attack packets. By studying the incoming and outgoing network traffic and different classifiers are used to analyze these features. The main objective of this paper is to study classifiers on one dataset for DDoS attack.
References
[1]. H. F. Lipson, “Tracking and Tracing” Cyber
Attacks: Technical Challenges and Global Policy
Issues”, CERT Coordination Centre, Special
Report: CMU/SEI-2002-SR-009, 2002
[2]. N. Stephen and N. Judy, Network Intrusion
Detection, 3nd ed., New Riders Publishing, United
States of America, 2002.
[3]. A. D. BasheerNayef, “Mitigation and traceback
countermeasures for DDoS attacks”, Iowa State
University, 2005. .
[4]. Chen, Y. Hwang, K., W. S. Ku, “Distributed
change-point detection of DDoS attacks over
multiple network domains.” Proceedings of the
IEEE International Symposium on Collaborative
Technologies and Systems, Las Vegas, NV, 14-17
May. IEEE CS, 2006, pp. 543–550.
[5]. L. Limwiwatkul, A. Rungsawang, “ Distributed
denial of service detection using TCP/IP header
and traffic measurement analysis”, Proceedings of
the IEEE International Symposium
Communications and Information Technology,
Sapporo, Japan, 26-29 October, IEEE CS, 2006, ,
pp. 605–610.
[6]. Lee, Juhyun Kim, Ki Hoon Kwon, Younggoo Han,
Sehun Kim, “DDoS attack detection method using
Cluster analysis”, Expert System with Applications
34, 2008, pp.1659-1665.
[7]. K. Reyhaneh, F. Ahmad, “An Anomaly-Based
Method for DDoS Attacks Detection using RBF
Neural Networks”, International Conference on
Network and Electronics Engineering IPCST
vol.11, 2011, IACSIT Press, Singapore.
[8]. Cristóbal Romero, Sebastián Ventura, Pedro G.
Espejo and César Hervás,” Data Mining
Algorithms to Classify Students”.
[9]. UCLA CSD packet
traces.http://www.lasr.cs.ucla.edu/ddos/traces/publi
c/usc.
[10]. N. Abirami, T. Kamalakannan and Dr. A.
Muthukumaravel ,” A Study on Analysis of
Various Data mining Classification Techniques on
Healthcare Data” International Journal of Emerging
Technology and Advanced Engineering, Volume 3,
Issue 7, July 2013,pp.604-607.
[11]. K. Wisaeng,”A Comparison of Different
Classification Techniques for Bank Direct
Marketing”, International Journal of Soft
Computing and Engineering, Volume-3, Issue-4,
September 2013, pp. 116-119.
[12]. S. Archana and Dr. K. Elangovan, “Survey of
Classification Techniques in Data Mining”,
International Journal of Computer Science and
Mobile Applications, Vol.2 Issue. 2, February-
2014, pg. 65-71
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Aggarwal A, Gupta A

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
