Year 2021, Volume 9 , Issue 1, Pages 12 - 25 2021-03-25

Farklı Türde Dağıtık Hizmet Dışı Bırakma Saldırılarının Tespiti
Detecting Different Types of Distributed Denial of Service Attacks

Esra SÖĞÜT [1] , Saadin OYUCU [2] , O. Ayhan ERDEM [3]


Dağıtık Hizmet Dışı Bırakma Saldırıları (DDoS: Denial-of-Service Attacks) internete bağlı her bir cihazı tehdit etmektedir. DDoS saldırılarının hızlı ilerlemesi ve geniş alana yayılması en bilinen özelliklerindendir. Hızlı ilerleyen ve geniş alana yayılan bu saldırıların etkisini azaltmak için birçok çalışma yapılmıştır. Ancak saldırı türlerinin sürekli gelişmesi ve farklı tekniklerin uygulanması nedenleriyle saldırıların engellenmesi tam olarak gerçekleştirilememiştir. Bu nedenle çalışma kapsamında öncelikle DDoS saldırısı incelenmiş ve tespit etmeye yönelik uygulamalar araştırılmıştır. Veri madenciliği yöntemleri kullanılarak DDoS saldırılarını tespit etmek için bir sistem önerilmiştir. Önerilen sistem için DDoS saldırı türlerinden Aktarım Denetimi Protokolü Saldırısı (TCP: Transmission Control Protocol Flooding), IP Sahteciliği Saldırısı (Spoofing IP: Internet Protocol), Maskelenen IP ile SYN Saldırısı (SYN Flood with Spoofed IP) ve Kullanıcı Veribloğu İletişim Kuralları Saldırısı (UDP: User Datagram Protocol Flooding) için deney düzenekleri kurulmuş ve saldırılar gerçekleştirilerek ağ akış verileri elde edilmiştir. Belirlenen özniteliklere göre uygun veri madenciliği yöntemleri ile sınıflandırma yapılmış ve ZeroR, OneR, Naive Bayes, Bayes Net, Decision Stump ve J48 algoritmaları kullanılmıştır. Bu algoritmalara göre en iyi sınıflandırma oranına J48 algoritması ile ulaşılmıştır. Elde edilen sonuçlar, önerilen sistemin DDoS saldırı türü belirlenmesinde önemli rol oynadığını göstermiştir. Önerilen sistem, gerçek saldırılarda uygun tespit mekanizmalarının daha hızlı, etkin ve verimli şekilde uygulanmasını sağlayacaktır.
Distributed Denial of Service Attacks (DDoS) are threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these fast-progressing and widespread attacks. However, because of the continuous development of attack types and the implementation of different techniques, the prevention of attacks has not been fully achieved. Therefore, within the scope of this study, a DDoS attack was examined first and applications for detecting it were investigated. A system has been proposed to detect DDoS attacks using data mining methods. For the proposed system, experiment mechanisms for Transmission Control Protocol (TCP) Flooding, Spoofing Internet Protocol (IP), SYN Flood with Spoofed IP, and User Datagram Protocol (UDP) Flooding, which are among the DDoS attack types, were established and the attacks were performed to obtain network flow data. The classification was made with appropriate data mining methods according to the specified features and ZeroR, OneR, Naive Bayes, Bayes Net, Decision Stump, and J48 algorithms were used. According to these algorithms, the best classification rate has been reached with J48 algorithm. The results have shown that the proposed system plays an important role in determining the DDoS attack type. The proposed system will ensure that appropriate detection mechanisms are applied more quickly, effectively and efficiently in real attacks.
  • [1] Kabakuş A. T., Kara R. 2016. DDoSdaps4web: Web'e Yönelik DDoS Tespit ve Koruma Yöntemi. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 32(1), 1-9.
  • [2] Devi S. R., Yogesh P. 2012. Detection of Application Layer DDoS Attacks Using Information Theory Based Metrics. Computer Science & Information Technology, 10, 217–223.
  • [3] Baykara, M., Daş, R. 2017. A Novel Hybrid Approach for Detection of Web-Based Attacks in Intrusion Detection Systems. International Journal of Computer Networks and Applications, 4(2), 62-76.
  • [4] Stein, L. D., Stewart, J. N. 2015. The World Wide Web Security FAQ: Securing Against Denial of Service Attacks. http://www.w3.org/Security/Faq/wwwsf6.html. (Accessed: 07.10.2020).
  • [5] Gezgin, D. M., Buluş, E. 2013. Kablosuz Ağlar için Bir DoS Saldırısı Tasarımı. Bilişim Teknolojileri Dergisi, 6(3):12.
  • [6] Raza, A. 2012. Anomaly Detection Systems for Distributed Denial of Service Attacks. University of Sindh, the Department of Electrical and Computer Engineering, Master Thesis, Pakistan.
  • [7] Wueest, C. 2014. Security Response: The Continued Rise of DDoS Attacks. Symantec. White paper, 1.
  • [8] Sonar, K., Upadhyay, H. 2014. A Survey: DDoS Attack on Internet of Things. International Journal of Engineering Research and Development, 10(11), 58-63.
  • [9] Çelikbilek, İ. 2016. TCP SYN Seli Saldırısının Etkilerini Azaltmak için Yeni SYN Çerezleri Gerçeklemesi. İstanbul Şehir Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, İstanbul.
  • [10] McGregory, S. 2013. Preparing for the Next DDoS Attack. Network Security, 2013(5), 5-6.
  • [11] Ingle, A., Awade, M. 2013. Intrusion Detection for TCP–SYNC Flood Attack. International Journal of Advanced Research in Computer Science, 4(5) Special Issue, 9-11.
  • [12] Duan, Z., Yuan, X., Chandrashekar, J. 2006. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. 25th IEEE International Conference on Computer Communications, Spain.
  • [13] Pahwa, P., Tiwari, G., Chhabra, R. 2010. Spoofing Media Access Control (MAC) and Its Counter Measures. International Journal of Advanced Engineering & Application, 186-192.
  • [14] Xie, Y., Yu, S. 2009. Monitoring the Application-Layer DDoS Attacks for IEEE. ACM Trans Netw, 17(1), 15-25.
  • [15] Söğüt, E. 2016. Gelişmiş Israrcı Tehdit Tespit Yöntemleri ve Bir Uygulaması. Gazi Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, Ankara.
  • [16] Cepheli Ö., Büyükçorak S., Karabulut K. G. 2014. Kullanıcı Modellemesi Tabanlı Dağıtık Servis Reddi Ataklarının Sezilmesi. 22nd Signal Processing and Communications Applications Conference, 2186-2189, Trabzon.
  • [17] Yuan, J., Mills, K. 2005. Monitoring the Macroscopic Effect of DDoS Flooding Attacks. IEEE Transactions on Dependable and Secure Computing, 2(4), 324-335.
  • [18] Shiaeles, S. N., Katos, V., Karakos, A. S., et al. 2012. Real Time DDoS Detection Using Fuzzy Estimators. Computers & Security, 31(6), 782-790.
  • [19] Karimazad, R., Faraahi, A. 2011. An Anomaly-Based Method for DDoS Attacks Detection Using RBF Neural Networks. International Conference on Network and Electronics Engineering, vol. 11, IACSIT Press, Singapore.
  • [20] Al-Duwairi, B. N. 2005. Mitigation and Traceback Countermeasures for DDoS Attacks. Iowa State University, Doctoral Thesis, USA.
  • [21] Limwiwatkul, L., Rungsawang, A. 2004. Distributed Denial of Service Detection Using TCP/IP Header and Traffic Measurement Analysis. IEEE International Symposium Communications and Information Technology, vol. 1, 605–610, Japan.
  • [22] Oo T. T., Phyu T. 2014. Analysis of DDoS Detection System Based on Anomaly Detection System. International Conference on Advances in Engineering and Technology, Singapore.
  • [23] Wireshark. https://www.wireshark.org/. (Erişim Tarihi: 15.09.2020).
  • [24] Witten I. H., Frank E., Hall M. A., et al. 2016. Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, Fourth Edition, Boston.
  • [25] KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. (Erişim Tarihi: 10.10.2020).
  • [26] Roolvink, S. 2008. Detecting Attacks Involving DNS Servers. University of Twente, Design and Analysis of Communication Systems. Master Thesis, The Netherlands.
  • [27] Erhan, D., Anarim, E., Kurt, G. K., Koşar, R. 2013. Effect of DDoS Attacks on Traffic Features. 21st Signal Processing and Communications Applications Conference, Girne, 1-4.
  • [28] Sahi, A., Lai, D., Li, Y., et al. 2017. An efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment. IEEE Access, 5, 6036-6048.
  • [29] Han, F., Xu, L., Yu, X., et al. 2016. Sliding-Mode Observers for Real-Time DDoS Detection. IEEE 11th Conference on Industrial Electronics and Applications, 825-830, USA.
  • [30] Osanaiye, O., Choo, K. K. R., Dlodlo, M. 2016. Analysing Feature Selection and Classification Techniques for DDoS Detection in Cloud. Southern Africa Telecommunication and Applications Conference, 198-203, South Africa.
  • [31] Pala, T. 2013. Tıbbi Karar Destek Sisteminin Veri Madenciliği Yöntemleriyle Gerçekleştirilmesi. Marmara Üniversitesi, Yüksek Lisans Tezi, İstanbul.
  • [32] Kökver, Y., Barışçı, N., Çiftçi, A., Ekmekçi, Y. 2014. Hipertansiyona Etki Eden Faktörlerin Veri Madenciliği Yöntemleriyle İncelenmesi. Engineering Sciences, 9(2), 15-25.
  • [33] Quinlan, J. R. 1986. Induction of Decision Trees. Machine learning, 1(1), 81-106.
  • [34] Daş, B., Türkoğlu, İ. 2014. DNA Dizilimlerinin Sınıflandırılmasında Karar Ağacı Algoritmalarının Karşılaştırılması. Elektrik-Elektronik-Bilgisayar ve Biyomedikal Mühendisliği Sempozyumu, 381-383, Bursa.
  • [35] Tekerek, A. 2021. A Novel Architecture for Web-Based Attack Detection Using Convolutional Neural Network. Computers & Security, 100, 102096, ISSN 0167-4048.
  • [36] Tuan, T.A., Long, H.V., Son, L.H., et al. 2020. Performance Evaluation of Botnet DDoS Attack Detection Using Machine Learning. Evolutionary Intelligence, 13, 283-294.
  • [37] Devi, B. S. K., Preetha, G., Selvaram, G., et al. 2014. An Impact Analysis: Real Time DDoS Attack Detection and Mitigation Using Machine Learning. International Conference on Recent Trends in Information Technology, 1-7.
  • [38] Doshi, R., Apthorpe, N., Feamster, N. 2018. Machine Learning DDoS Detection for Consumer Internet of Things Devices. IEEE Symposium on Security and Privacy Workshops, 29-35.
Primary Language en
Subjects Engineering
Journal Section Tasarım ve Teknoloji
Authors

Orcid: 0000-0002-0051-2271
Author: Esra SÖĞÜT (Primary Author)
Institution: GAZİ ÜNİVERSİTESİ
Country: Turkey


Orcid: 0000-0003-3880-3039
Author: Saadin OYUCU
Institution: ADIYAMAN ÜNİVERSİTESİ
Country: Turkey


Orcid: 0000-0001-7761-1078
Author: O. Ayhan ERDEM
Institution: GAZİ ÜNİVERSİTESİ
Country: Turkey


Dates

Application Date : December 13, 2020
Publication Date : March 25, 2021

Bibtex @research article { gujsc840126, journal = {Gazi University Journal of Science Part C: Design and Technology}, issn = {}, eissn = {2147-9526}, address = {}, publisher = {Gazi University}, year = {2021}, volume = {9}, pages = {12 - 25}, doi = {10.29109/gujsc.840126}, title = {Detecting Different Types of Distributed Denial of Service Attacks}, key = {cite}, author = {Söğüt, Esra and Oyucu, Saadin and Erdem, O. Ayhan} }
APA Söğüt, E , Oyucu, S , Erdem, O . (2021). Detecting Different Types of Distributed Denial of Service Attacks . Gazi University Journal of Science Part C: Design and Technology , 9 (1) , 12-25 . DOI: 10.29109/gujsc.840126
MLA Söğüt, E , Oyucu, S , Erdem, O . "Detecting Different Types of Distributed Denial of Service Attacks" . Gazi University Journal of Science Part C: Design and Technology 9 (2021 ): 12-25 <https://dergipark.org.tr/en/pub/gujsc/issue/60733/840126>
Chicago Söğüt, E , Oyucu, S , Erdem, O . "Detecting Different Types of Distributed Denial of Service Attacks". Gazi University Journal of Science Part C: Design and Technology 9 (2021 ): 12-25
RIS TY - JOUR T1 - Detecting Different Types of Distributed Denial of Service Attacks AU - Esra Söğüt , Saadin Oyucu , O. Ayhan Erdem Y1 - 2021 PY - 2021 N1 - doi: 10.29109/gujsc.840126 DO - 10.29109/gujsc.840126 T2 - Gazi University Journal of Science Part C: Design and Technology JF - Journal JO - JOR SP - 12 EP - 25 VL - 9 IS - 1 SN - -2147-9526 M3 - doi: 10.29109/gujsc.840126 UR - https://doi.org/10.29109/gujsc.840126 Y2 - 2021 ER -
EndNote %0 Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji Detecting Different Types of Distributed Denial of Service Attacks %A Esra Söğüt , Saadin Oyucu , O. Ayhan Erdem %T Detecting Different Types of Distributed Denial of Service Attacks %D 2021 %J Gazi University Journal of Science Part C: Design and Technology %P -2147-9526 %V 9 %N 1 %R doi: 10.29109/gujsc.840126 %U 10.29109/gujsc.840126
ISNAD Söğüt, Esra , Oyucu, Saadin , Erdem, O. Ayhan . "Detecting Different Types of Distributed Denial of Service Attacks". Gazi University Journal of Science Part C: Design and Technology 9 / 1 (March 2021): 12-25 . https://doi.org/10.29109/gujsc.840126
AMA Söğüt E , Oyucu S , Erdem O . Detecting Different Types of Distributed Denial of Service Attacks. GUJS Part C. 2021; 9(1): 12-25.
Vancouver Söğüt E , Oyucu S , Erdem O . Detecting Different Types of Distributed Denial of Service Attacks. Gazi University Journal of Science Part C: Design and Technology. 2021; 9(1): 12-25.
IEEE E. Söğüt , S. Oyucu and O. Erdem , "Detecting Different Types of Distributed Denial of Service Attacks", Gazi University Journal of Science Part C: Design and Technology, vol. 9, no. 1, pp. 12-25, Mar. 2021, doi:10.29109/gujsc.840126