Critical review of machine learning approaches to apply big data analytics in DDoS forensics

Kian Son Hoon, Kheng Cher Yeo, S. Azam, Bharanidharan Shunmugam, F. De Boer
{"title":"Critical review of machine learning approaches to apply big data analytics in DDoS forensics","authors":"Kian Son Hoon, Kheng Cher Yeo, S. Azam, Bharanidharan Shunmugam, F. De Boer","doi":"10.1109/ICCCI.2018.8441286","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are becoming more frequent and easier to execute. The sharp increase in network traffic presents challenges to conduct DDoS forensics. Despite different tools being developed, few take into account of the increase in network traffic. This research aims to recommend the best learning model for DDoS forensics. To this extend, the paper reviewed different literature to understand the challenges and opportunities of employing big data in DDoS forensics. Multiple simulations were carried out to compare the performance of different models. Two data mining tools WEKA and H2O were used to implement both supervised and unsupervised learning models. The training and testing of the models made use of intrusion dataset from oN-Line System - Knowledge Discovery & Data mining (NSL-KDD). The models are then evaluated according to their efficiency and accuracy. Overall, result shows that supervised learning algorithms perform better than unsupervised learning algorithms. It was found that Naïve Bayes, Gradient Boosting Machine and Distributed Random Forest are the most suitable model for DDoS detection because of its accuracy and time taken to train. Both Gradient Boosting Machine and Distributed Random Forest were further investigated to determine the parameters that can yield better accuracy. Future research can be extended by installing different DDoS detection models in an actual environment and compare their performances in actual attacks.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Computer Communication and Informatics (ICCCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCI.2018.8441286","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26

Abstract

Distributed Denial of Service (DDoS) attacks are becoming more frequent and easier to execute. The sharp increase in network traffic presents challenges to conduct DDoS forensics. Despite different tools being developed, few take into account of the increase in network traffic. This research aims to recommend the best learning model for DDoS forensics. To this extend, the paper reviewed different literature to understand the challenges and opportunities of employing big data in DDoS forensics. Multiple simulations were carried out to compare the performance of different models. Two data mining tools WEKA and H2O were used to implement both supervised and unsupervised learning models. The training and testing of the models made use of intrusion dataset from oN-Line System - Knowledge Discovery & Data mining (NSL-KDD). The models are then evaluated according to their efficiency and accuracy. Overall, result shows that supervised learning algorithms perform better than unsupervised learning algorithms. It was found that Naïve Bayes, Gradient Boosting Machine and Distributed Random Forest are the most suitable model for DDoS detection because of its accuracy and time taken to train. Both Gradient Boosting Machine and Distributed Random Forest were further investigated to determine the parameters that can yield better accuracy. Future research can be extended by installing different DDoS detection models in an actual environment and compare their performances in actual attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
机器学习方法在DDoS取证中应用大数据分析的关键回顾
分布式拒绝服务(DDoS)攻击变得越来越频繁,也越来越容易执行。网络流量的急剧增加给DDoS取证带来了挑战。尽管开发了不同的工具,但很少考虑到网络流量的增加。本研究旨在推荐DDoS取证的最佳学习模型。为此,本文回顾了不同的文献,以了解在DDoS取证中使用大数据的挑战和机遇。为了比较不同模型的性能,进行了多次仿真。使用两个数据挖掘工具WEKA和H2O来实现有监督和无监督学习模型。模型的训练和测试使用了在线系统-知识发现与数据挖掘(NSL-KDD)的入侵数据集。然后根据模型的效率和准确性对其进行评估。总体而言,结果表明监督学习算法优于无监督学习算法。我们发现Naïve贝叶斯、梯度增强机和分布式随机森林是最适合DDoS检测的模型,因为它们的准确性和训练时间都比较短。对梯度增强机和分布式随机森林进行了进一步的研究,以确定能够产生更好精度的参数。未来的研究可以通过在实际环境中安装不同的DDoS检测模型,比较它们在实际攻击中的性能来扩展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Critical review of machine learning approaches to apply big data analytics in DDoS forensics Detection of the effect of exercise on APG signals Categorisation of security threats for smart home appliances Rotation-based LTE downlink resource scheduling using queue status monitoring Design and Analysis of Booth Multiplier with Optimised Power Delay Product
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1