Research Article

Detecting Different Types of Distributed Denial of Service Attacks

Volume: 9 Number: 1 March 25, 2021
EN TR

Detecting Different Types of Distributed Denial of Service Attacks

Abstract

Distributed Denial of Service Attacks (DDoS) are threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these fast-progressing and widespread attacks. However, because of the continuous development of attack types and the implementation of different techniques, the prevention of attacks has not been fully achieved. Therefore, within the scope of this study, a DDoS attack was examined first and applications for detecting it were investigated. A system has been proposed to detect DDoS attacks using data mining methods. For the proposed system, experiment mechanisms for Transmission Control Protocol (TCP) Flooding, Spoofing Internet Protocol (IP), SYN Flood with Spoofed IP, and User Datagram Protocol (UDP) Flooding, which are among the DDoS attack types, were established and the attacks were performed to obtain network flow data. The classification was made with appropriate data mining methods according to the specified features and ZeroR, OneR, Naive Bayes, Bayes Net, Decision Stump, and J48 algorithms were used. According to these algorithms, the best classification rate has been reached with J48 algorithm. The results have shown that the proposed system plays an important role in determining the DDoS attack type. The proposed system will ensure that appropriate detection mechanisms are applied more quickly, effectively and efficiently in real attacks.

Keywords

References

  1. [1] Kabakuş A. T., Kara R. 2016. DDoSdaps4web: Web'e Yönelik DDoS Tespit ve Koruma Yöntemi. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 32(1), 1-9.
  2. [2] Devi S. R., Yogesh P. 2012. Detection of Application Layer DDoS Attacks Using Information Theory Based Metrics. Computer Science & Information Technology, 10, 217–223.
  3. [3] Baykara, M., Daş, R. 2017. A Novel Hybrid Approach for Detection of Web-Based Attacks in Intrusion Detection Systems. International Journal of Computer Networks and Applications, 4(2), 62-76.
  4. [4] Stein, L. D., Stewart, J. N. 2015. The World Wide Web Security FAQ: Securing Against Denial of Service Attacks. http://www.w3.org/Security/Faq/wwwsf6.html. (Accessed: 07.10.2020).
  5. [5] Gezgin, D. M., Buluş, E. 2013. Kablosuz Ağlar için Bir DoS Saldırısı Tasarımı. Bilişim Teknolojileri Dergisi, 6(3):12.
  6. [6] Raza, A. 2012. Anomaly Detection Systems for Distributed Denial of Service Attacks. University of Sindh, the Department of Electrical and Computer Engineering, Master Thesis, Pakistan.
  7. [7] Wueest, C. 2014. Security Response: The Continued Rise of DDoS Attacks. Symantec. White paper, 1.
  8. [8] Sonar, K., Upadhyay, H. 2014. A Survey: DDoS Attack on Internet of Things. International Journal of Engineering Research and Development, 10(11), 58-63.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Publication Date

March 25, 2021

Submission Date

December 13, 2020

Acceptance Date

January 22, 2021

Published in Issue

Year 2021 Volume: 9 Number: 1

APA
Söğüt, E., Oyucu, S., & Erdem, O. A. (2021). Detecting Different Types of Distributed Denial of Service Attacks. Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım Ve Teknoloji, 9(1), 12-25. https://doi.org/10.29109/gujsc.840126

                                TRINDEX     16167        16166    21432    logo.png

      

    e-ISSN:2147-9526