Detection of DDoS Attack Using UCLA Dataset on Different Classifiers

Authors

  • Aggarwal A Dept. of Computer Science and Engineering, Geeta Institute Of Technology and Management, Kurukshetra, India
  • Gupta A Dept. of Computer Science and Engineering, Geeta Institute Of Technology and Management, Kurukshetra, India

Keywords:

DDoS attack, Internet Securities, Attack Packet

Abstract

Distributed denial of service attack have strong Impact on security of internet because these attacks affects the normal functioning causing loss of billions of dollars. DDoS is very harmful to network as it delays the legitimate users from excessing the server. However these networks were well equipped in security yet they were damaged by DDoS attack. In this paper, the proposed system presents both detecting and classifying schemes of DDoS attack using K-NN, SVM and Naïve Bayesian. The algorithms are developed by using various features of attack packets. By studying the incoming and outgoing network traffic and different classifiers are used to analyze these features. The main objective of this paper is to study classifiers on one dataset for DDoS attack.

References

[1]. H. F. Lipson, “Tracking and Tracing” Cyber

Attacks: Technical Challenges and Global Policy

Issues”, CERT Coordination Centre, Special

Report: CMU/SEI-2002-SR-009, 2002

[2]. N. Stephen and N. Judy, Network Intrusion

Detection, 3nd ed., New Riders Publishing, United

States of America, 2002.

[3]. A. D. BasheerNayef, “Mitigation and traceback

countermeasures for DDoS attacks”, Iowa State

University, 2005. .

[4]. Chen, Y. Hwang, K., W. S. Ku, “Distributed

change-point detection of DDoS attacks over

multiple network domains.” Proceedings of the

IEEE International Symposium on Collaborative

Technologies and Systems, Las Vegas, NV, 14-17

May. IEEE CS, 2006, pp. 543–550.

[5]. L. Limwiwatkul, A. Rungsawang, “ Distributed

denial of service detection using TCP/IP header

and traffic measurement analysis”, Proceedings of

the IEEE International Symposium

Communications and Information Technology,

Sapporo, Japan, 26-29 October, IEEE CS, 2006, ,

pp. 605–610.

[6]. Lee, Juhyun Kim, Ki Hoon Kwon, Younggoo Han,

Sehun Kim, “DDoS attack detection method using

Cluster analysis”, Expert System with Applications

34, 2008, pp.1659-1665.

[7]. K. Reyhaneh, F. Ahmad, “An Anomaly-Based

Method for DDoS Attacks Detection using RBF

Neural Networks”, International Conference on

Network and Electronics Engineering IPCST

vol.11, 2011, IACSIT Press, Singapore.

[8]. Cristóbal Romero, Sebastián Ventura, Pedro G.

Espejo and César Hervás,” Data Mining

Algorithms to Classify Students”.

[9]. UCLA CSD packet

traces.http://www.lasr.cs.ucla.edu/ddos/traces/publi

c/usc.

[10]. N. Abirami, T. Kamalakannan and Dr. A.

Muthukumaravel ,” A Study on Analysis of

Various Data mining Classification Techniques on

Healthcare Data” International Journal of Emerging

Technology and Advanced Engineering, Volume 3,

Issue 7, July 2013,pp.604-607.

[11]. K. Wisaeng,”A Comparison of Different

Classification Techniques for Bank Direct

Marketing”, International Journal of Soft

Computing and Engineering, Volume-3, Issue-4,

September 2013, pp. 116-119.

[12]. S. Archana and Dr. K. Elangovan, “Survey of

Classification Techniques in Data Mining”,

International Journal of Computer Science and

Mobile Applications, Vol.2 Issue. 2, February-

2014, pg. 65-71

Downloads

Published

2015-08-30

How to Cite

[1]
A. Aggarwal and A. Gupta, “Detection of DDoS Attack Using UCLA Dataset on Different Classifiers”, Int. J. Comp. Sci. Eng., vol. 3, no. 8, pp. 32–36, Aug. 2015.

Issue

Section

Research Article