Araştırma Makalesi

Detecting Different Types of Distributed Denial of Service Attacks

Cilt: 9 Sayı: 1 25 Mart 2021
PDF İndir
EN TR

Detecting Different Types of Distributed Denial of Service Attacks

Abstract

Distributed Denial of Service Attacks (DDoS) are threaten every device connected to the Internet. The fast progress and wide spreading DDoS attacks are among the most well-known features of them. Many studies have been conducted to reduce the impact of these fast-progressing and widespread attacks. However, because of the continuous development of attack types and the implementation of different techniques, the prevention of attacks has not been fully achieved. Therefore, within the scope of this study, a DDoS attack was examined first and applications for detecting it were investigated. A system has been proposed to detect DDoS attacks using data mining methods. For the proposed system, experiment mechanisms for Transmission Control Protocol (TCP) Flooding, Spoofing Internet Protocol (IP), SYN Flood with Spoofed IP, and User Datagram Protocol (UDP) Flooding, which are among the DDoS attack types, were established and the attacks were performed to obtain network flow data. The classification was made with appropriate data mining methods according to the specified features and ZeroR, OneR, Naive Bayes, Bayes Net, Decision Stump, and J48 algorithms were used. According to these algorithms, the best classification rate has been reached with J48 algorithm. The results have shown that the proposed system plays an important role in determining the DDoS attack type. The proposed system will ensure that appropriate detection mechanisms are applied more quickly, effectively and efficiently in real attacks.

Keywords

Kaynakça

  1. [1] Kabakuş A. T., Kara R. 2016. DDoSdaps4web: Web'e Yönelik DDoS Tespit ve Koruma Yöntemi. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 32(1), 1-9.
  2. [2] Devi S. R., Yogesh P. 2012. Detection of Application Layer DDoS Attacks Using Information Theory Based Metrics. Computer Science & Information Technology, 10, 217–223.
  3. [3] Baykara, M., Daş, R. 2017. A Novel Hybrid Approach for Detection of Web-Based Attacks in Intrusion Detection Systems. International Journal of Computer Networks and Applications, 4(2), 62-76.
  4. [4] Stein, L. D., Stewart, J. N. 2015. The World Wide Web Security FAQ: Securing Against Denial of Service Attacks. http://www.w3.org/Security/Faq/wwwsf6.html. (Accessed: 07.10.2020).
  5. [5] Gezgin, D. M., Buluş, E. 2013. Kablosuz Ağlar için Bir DoS Saldırısı Tasarımı. Bilişim Teknolojileri Dergisi, 6(3):12.
  6. [6] Raza, A. 2012. Anomaly Detection Systems for Distributed Denial of Service Attacks. University of Sindh, the Department of Electrical and Computer Engineering, Master Thesis, Pakistan.
  7. [7] Wueest, C. 2014. Security Response: The Continued Rise of DDoS Attacks. Symantec. White paper, 1.
  8. [8] Sonar, K., Upadhyay, H. 2014. A Survey: DDoS Attack on Internet of Things. International Journal of Engineering Research and Development, 10(11), 58-63.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Mühendislik

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

25 Mart 2021

Gönderilme Tarihi

13 Aralık 2020

Kabul Tarihi

22 Ocak 2021

Yayımlandığı Sayı

Yıl 2021 Cilt: 9 Sayı: 1

Kaynak Göster

APA
Söğüt, E., Oyucu, S., & Erdem, O. A. (2021). Detecting Different Types of Distributed Denial of Service Attacks. Gazi Üniversitesi Fen Bilimleri Dergisi Part C: Tasarım ve Teknoloji, 9(1), 12-25. https://doi.org/10.29109/gujsc.840126

                                     16168      16167     16166     21432        logo.png   


    e-ISSN:2147-9526