A Comparative Review on DDoS Attack Detection Using Machine Learning Techniques

Zerin Hasan Sahosh, Azraf Faheem, Marzana Bintay Tuba, Syeda Anika Tasnim, Syeda Anika, Tasnim
{"title":"A Comparative Review on DDoS Attack Detection Using Machine Learning Techniques","authors":"Zerin Hasan Sahosh, Azraf Faheem, Marzana Bintay Tuba, Syeda Anika Tasnim, Syeda Anika, Tasnim","doi":"10.56532/mjsat.v4i2.208","DOIUrl":null,"url":null,"abstract":"The rapid growth of the internet and the increasing reliance on digital infrastructures have posed significant challenges to cybersecurity. Among the other variants of attacks, Distributed Denial of Service (DDoS) attacks have emerged as one of the most destructive and common threats. These attacks disrupt or slow down network services by overwhelming the network infrastructure with a massive volume of malicious traffic. To effectively identify and mitigate DDoS attacks, machine learning techniques have been extensively employed in intrusion detection systems. Machine learning approaches offer the advantage of automating the detection process by learning patterns and characteristics of DDoS attacks from historical data. Researchers have explored various machine learning algorithms such as K-Nearest Neighbours (KNN), Support Vector Machine (SVM), Random Forest (RF), and Naïve Bayes to classify and detect DDoS attacks. These algorithms leverage features extracted from network traffic data, including packet size, packet delay patterns, and traffic behaviour, to differentiate between normal and malicious traffic.","PeriodicalId":496585,"journal":{"name":"Malaysian Journal of Science and Advanced Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Malaysian Journal of Science and Advanced Technology","FirstCategoryId":"0","ListUrlMain":"https://doi.org/10.56532/mjsat.v4i2.208","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid growth of the internet and the increasing reliance on digital infrastructures have posed significant challenges to cybersecurity. Among the other variants of attacks, Distributed Denial of Service (DDoS) attacks have emerged as one of the most destructive and common threats. These attacks disrupt or slow down network services by overwhelming the network infrastructure with a massive volume of malicious traffic. To effectively identify and mitigate DDoS attacks, machine learning techniques have been extensively employed in intrusion detection systems. Machine learning approaches offer the advantage of automating the detection process by learning patterns and characteristics of DDoS attacks from historical data. Researchers have explored various machine learning algorithms such as K-Nearest Neighbours (KNN), Support Vector Machine (SVM), Random Forest (RF), and Naïve Bayes to classify and detect DDoS attacks. These algorithms leverage features extracted from network traffic data, including packet size, packet delay patterns, and traffic behaviour, to differentiate between normal and malicious traffic.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用机器学习技术检测 DDoS 攻击的比较综述
互联网的快速发展和对数字基础设施的日益依赖给网络安全带来了巨大挑战。在其他各种攻击中,分布式拒绝服务(DDoS)攻击已成为最具破坏性和最常见的威胁之一。这些攻击通过大量恶意流量压垮网络基础设施,从而破坏或减缓网络服务。为了有效识别和缓解 DDoS 攻击,机器学习技术已被广泛应用于入侵检测系统中。机器学习方法通过从历史数据中学习 DDoS 攻击的模式和特征,实现了检测过程的自动化。研究人员探索了各种机器学习算法,如 K-Nearest Neighbours (KNN)、Support Vector Machine (SVM)、Random Forest (RF) 和 Naïve Bayes,用于对 DDoS 攻击进行分类和检测。这些算法利用从网络流量数据(包括数据包大小、数据包延迟模式和流量行为)中提取的特征来区分正常流量和恶意流量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Effects of Over-burnt Bricks on Gradation, Water Absorption and Specific Gravity of Aggregates, Workability and Compressive Strength of Concrete IoT-enabled Smart Weather Stations: Innovations, Challenges, and Future Directions IoT-enabled Greenhouse Systems: Optimizing Plant Growth and Efficiency Improving Fish Quality and Yield: An Automated Monitoring System for Intensive Aquaculture Transformative Applications of IoT in Diverse Industries: A Mini Review
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1