Print
Category: Computer Science
Hits: 1762

DETECTING DISTRIBUTED DENIAL OF SERVICE ATTACKS USING DATA MINING TECHNIQUES

(IJACSA) International Journal of Advanced Computer Science and Applications
Digital Object Identifier (DOI) : 10.14569/IJACSA.2016.070159


Abstract:

Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks. The intrusion-detection system (IDS) is one of the solutions to detecting and classifying any anomalous behavior. The IDS system should always be updated with the latest intruder attack deterrents to preserve the confidentiality, integrity and availability of the service. In this paper, a new dataset is collected because there were no common data sets that contain modern DDoS attacks in different network layers, such as (SIDDoS, HTTP Flood). This work incorporates three well-known classification techniques: Multilayer Perceptron (MLP), Naïve Bayes and Random Forest. The experimental results show that MLP achieved the highest accuracy rate (98.63%).