Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto

Authors

  • Paradise Paradise Institut Teknologi Telkom Purwokerto, Purwokerto
  • Wahyu Adi Prabowo Institut Teknologi Telkom Purwokerto, Purwokerto
  • Teguh Rijanandi Institut Teknologi Telkom Purwokerto, Purwokerto

DOI:

https://doi.org/10.30865/mib.v7i1.5199

Keywords:

DDOS, Support Vector Machine, Fuzzy Tsukamoto

Abstract

Advances in technology in the field of information technology services allow hackers to attack internet systems, one of which is the DDOS attack, more specifically, the smurf attack, which involves multiple computers attacking database server systems and File Transfer Protocol (FTP). The DDOS smurf attack significantly affects computer network traffic. This research will analyze the classification of machine learning Support Vector Machine (SVM) and Fuzzy Tsukamoto in detecting DDOS attacks using intensive simulations in analyzing computer networks. Classification techniques in machine learning, such as SVM and fuzzy Tsukamoto, can make it easier to distinguish computer network traffic when detecting DDOS attacks on servers. Three variables are used in this classification: the length of the packet, the number of packets, and the number of packet senders. By testing 51 times, 50 times is the DDOS attack trial dataset performed in a computer laboratory, and one dataset derived from DDOS attack data is CAIDA 2007 data. From this study, we obtained an analysis of the accuracy level of the classification of machine learning SVM and fuzzy Tsukamoto, each at 100%.

References

I. Lizarralde, C. Mateos, J. M. Rodriguez, and A. Zunino, “Exploiting named entity recognition for improving syntactic-based web service discovery,†J Inf Sci, vol. 45, no. 3, 2019, doi: 10.1177/0165551518793321.

L. Jiang, Q. Xie, and L. Chen, “Application and Feasibility Study of Integrated Nursing Information Construction in Nephrology Nursing,†J Healthc Eng, vol. 2022, 2022, doi: 10.1155/2022/7033840.

D. N. Aryani et al., “Factors Influencing Consumer Behavioral Intention to Use Food Delivery Services: A Study of Foodpanda,†Journal of The Community Development in Asia, vol. 5, no. 1, 2022.

F. Liang, L. Mu, D. Wang, and B. S. Kim, “A new model path for the development of smart leisure sports tourism industry based on 5G technology,†IET Communications, vol. 16, no. 5, 2022, doi: 10.1049/cmu2.12271.

P. Tambare, C. Meshram, C. C. Lee, R. J. Ramteke, and A. L. Imoize, “Performance measurement system and quality management in dataâ€driven industry 4.0: A review,†Sensors, vol. 22, no. 1. 2022. doi: 10.3390/s22010224.

Z. Bezhovski, “The Future of the Mobile Payment as Electronic Payment System,†European Journal of Business and Management, 2016.

M. C. Cohen, “Big Data and Service Operations,†Prod Oper Manag, vol. 27, no. 9, 2018, doi: 10.1111/poms.12832.

M. Zolotukhin, T. Hamalainen, T. Kokkonen, and J. Siltanen, “Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic,†in 2016 23rd International Conference on Telecommunications, ICT 2016, 2016. doi: 10.1109/ICT.2016.7500408.

D. J. Prathyusha and G. Kannayaram, “A cognitive mechanism for mitigating DDoS attacks using the artificial immune system in a cloud environment,†Evol Intell, vol. 14, no. 2, 2021, doi: 10.1007/s12065-019-00340-4.

X. Zhang, O. Upton, N. L. Beebe, and K. K. R. Choo, “IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers,†Forensic Science International: Digital Investigation, vol. 32, 2020, doi: 10.1016/j.fsidi.2020.300926.

P. K. Manadhata, S. Yadav, P. Rao, and W. Horne, “Detecting malicious domains via graph inference,†in Proceedings of the ACM Conference on Computer and Communications Security, 2014, vol. 2014-November, no. November. doi: 10.1145/2666652.2666659.

Y. M. Alginahi and M. N. Kabir, Authentication technologies for cloud computing, iot and big data. 2019. doi: 10.1049/pbse009e.

S. Shamshirband, N. B. Anuar, M. L. M. Kiah, and A. Patel, “An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique,†Engineering Applications of Artificial Intelligence, vol. 26, no. 9. 2013. doi: 10.1016/j.engappai.2013.04.010.

S. Sambangi and L. Gondi, “A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression,†2020. doi: 10.3390/proceedings2020063051.

A. A. Sallam, M. N. Kabir, Y. M. Alginahi, A. Jamal, and T. K. Esmeel, “IDS for Improving DDoS Attack Recognition Based on Attack Profiles and Network Traffic Features,†in Proceedings - 2020 16th IEEE International Colloquium on Signal Processing and its Applications, CSPA 2020, 2020. doi: 10.1109/CSPA48992.2020.9068679.

F. Hussain, S. G. Abbas, U. U. Fayyaz, G. A. Shah, A. Toqeer, and A. Ali, “Towards a Universal Features Set for IoT Botnet Attacks Detection,†in Proceedings - 2020 23rd IEEE International Multi-Topic Conference, INMIC 2020, 2020. doi: 10.1109/INMIC50486.2020.9318106.

F. Hussain, S. G. Abbas, M. Husnain, U. U. Fayyaz, F. Shahzad, and G. A. Shah, “IoT DoS and DDoS Attack Detection using ResNet,†in Proceedings - 2020 23rd IEEE International Multi-Topic Conference, INMIC 2020, 2020. doi: 10.1109/INMIC50486.2020.9318216.

N. Z. Bawany, J. A. Shamsi, and K. Salah, “DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions,†Arabian Journal for Science and Engineering, vol. 42, no. 2. 2017. doi: 10.1007/s13369-017-2414-5.

H. Wang et al., “DDoS Attack in Software Defined Networks: A Survey,†Neural Regen Res, vol. 7, no. 14, 2017.

L. F. Eliyan and R. di Pietro, “DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges,†Future Generation Computer Systems, vol. 122, 2021, doi: 10.1016/j.future.2021.03.011.

V. Deepa, K. Muthamil Sudar, and P. Deepalakshmi, “Detection of DDoS attack on SDN control plane using hybrid machine learning techniques,†in Proceedings of the International Conference on Smart Systems and Inventive Technology, ICSSIT 2018, 2018. doi: 10.1109/ICSSIT.2018.8748836.

L. Yang and H. Zhao, “DDoS attack identification and defense using SDN based on machine learning method,†in Proceedings - 2018 15th International Symposium on Pervasive Systems, Algorithms and Networks, I-SPAN 2018, 2019. doi: 10.1109/I-SPAN.2018.00036.

M. Revathi, V. v. Ramalingam, and B. Amutha, “A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework,†Wirel Pers Commun, 2021, doi: 10.1007/s11277-021-09071-1.

R. T. Kokila, S. Thamarai Selvi, and K. Govindarajan, “DDoS detection and analysis in SDN-based environment using support vector machine classifier,†in 6th International Conference on Advanced Computing, ICoAC 2014, 2015. doi: 10.1109/ICoAC.2014.7229711.

Q. Niyaz, W. Sun, and A. Y. Javaid, “A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN),†ICST Transactions on Security and Safety, vol. 4, no. 12, 2017, doi: 10.4108/eai.28-12-2017.153515.

G. de La Torre Parra, P. Rad, K. K. R. Choo, and N. Beebe, “Detecting Internet of Things attacks using distributed deep learning,†Journal of Network and Computer Applications, vol. 163, Aug. 2020, doi: 10.1016/j.jnca.2020.102662.

Downloads

Published

2023-01-28