Cover
Vol. 20 No. 1 (2024)

Published: June 30, 2024

Pages: 16-24

Original Article

An Assessment of Ensemble Voting Approaches, Random Forest, and Decision Tree Techniques in Detecting Distributed Denial of Service (DDoS) Attacks

Abstract

The reliance on networks and systems has grown rapidly in contemporary times, leading to increased vulnerability to cyber assaults. The Distributed Denial-of-Service (Distributed Denial of Service) attack, a threat that can cause great financial liabilities and reputation damage. To address this problem, Machine Learning (ML) algorithms have gained huge attention, enabling the detection and prevention of DDOS (Distributed Denial of Service) Attacks. In this study, we proposed a novel security mechanism to avoid Distributed Denial of Service attacks. Using an ensemble learning methodology aims to it also can differentiate between normal network traffic and the malicious flood of Distributed Denial of Service attack traffic. The study also evaluates the performance of two well-known ML algorithms, namely, the decision tree and random forest, which were used to execute the proposed method. Tree in defending against Distributed Denial of Service (DDoS) attacks. We test the models using a publicly available dataset called TIME SERIES DATASET FOR DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION. We compare the performance of models using a list of evaluation metrics developing the Model. This step involves fetching the data, preprocessing it, and splitting it into training and testing subgroups, model selection, and validation. When applied to a database of nearly 11,000 time series; in some cases, the proposed approach manifested promising results and reached an Accuracy (ACC) of up to 100 % in the dataset. Ultimately, this proposed method detects and mitigates distributed denial of service. The solution to securing communication systems from this increasing cyber threat is this: preventing attacks from being successful.

References

  1. Y.-F. Li, P. K. Das, and D. L. Dowe, “Two decades of web application testing—a survey of recent advances,” Information Systems, vol. 43, pp. 20–54, 2014.
  2. Q. Li, H. Peng, J. Li, C. Xia, R. Yang, L. Sun, P. S. Yu, and L. He, “A survey on text classification: From shal- low to deep learning,” arXiv preprint arXiv:2008.00364, 2020.
  3. A. Beloglazov, J. Abawajy, and R. Buyya, “Energy- aware resource allocation heuristics for efficient man- agement of data centers for cloud computing,” Future generation computer systems, vol. 28, no. 5, pp. 755– 768, 2012.
  4. R. Hummel, C. Hildebrand, H. Modi, and G. Sockrider, “Netscout threat intelligence report,” Netscout Systems, Inc., Tech. Rep, 2020.
  5. S. Wani, M. Imthiyas, H. Almohamedh, K. Alhamed, S. Almotairi, and Y. Gulzar, “Distributed denial of ser- vice (ddos) mitigation using blockchain—a comprehen- sive insight. symmetry 2021, 13, 227,” 2021.
  6. A. A. Najar and S. Manohar Naik, “Ddos attack detec- tion using mlp and random forest algorithms,” Interna- tional Journal of Information Technology, vol. 14, no. 5, pp. 2317–2327, 2022.
  7. A. A. Abdulrahman and M. K. Ibrahem, “Evaluation of ddos attacks detection in a new intrusion dataset based on classification algorithms,” Iraqi Journal of In- formation and Communication Technology, vol. 1, no. 3, pp. 49–55, 2018.
  8. N. Bindra and M. Sood, “Detecting ddos attacks using machine learning techniques and contemporary intrusion detection dataset,” Automatic Control and Computer Sciences, vol. 53, pp. 419–428, 2019.
  9. T. A. Tuan, H. V. Long, L. H. Son, R. Kumar, I. Priyadarshini, and N. T. K. Son, “Performance eval- uation of botnet ddos attack detection using machine learning,” Evolutionary Intelligence, vol. 13, pp. 283– 294, 2020.
  10. G. Usha, M. Narang, and A. Kumar, “Detection and classification of distributed dos attacks using machine learning,” in Computer Networks and Inventive Commu- nication Technologies: Proceedings of Third ICCNCT 2020, pp. 985–1000, Springer, 2021.
  11. I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghor- bani, “Developing realistic distributed denial of service (ddos) attack dataset and taxonomy,” in 2019 Interna- tional Carnahan Conference on Security Technology (ICCST), pp. 1–8, IEEE, 2019.
  12. M. Jabbar, R. Aluvalu, et al., “Rfaode: A novel ensemble intrusion detection system,” Procedia computer science, vol. 115, pp. 226–234, 2017.
  13. C. Hu, Ensemble feature learning-based event classifica- tion for cyber-physical security of the smart grid. PhD thesis, Concordia University, 2019.
  14. O. Rahman, M. A. G. Quraishi, and C.-H. Lung, “Ddos attacks detection and mitigation in sdn using machine learning,” in 2019 IEEE world congress on services (SERVICES), vol. 2642, pp. 184–189, IEEE, 2019.
  15. S. S. Priya, M. Sivaram, D. Yuvaraj, and A. Jayanthiladevi, “Machine learning based ddos detection,” in 2020 International Conference on Emerging Smart Computing and Informatics (ESCI), pp. 234–237, IEEE, 2020.
  16. ´A. Michelana, J. Aveleira-Mata, E. Jove, H. Alaiz- Moret´on, H. Quinti´an, and J. L. Calvo-Rolle, “Denial of service attack detection based on feature extraction and supervised techniques,” in International Symposium on Distributed Computing and Artificial Intelligence, pp. 59–68, Springer, 2022.
  17. M. S. I. Alsumaidaie, K. M. A. Alheeti, and A. K. Al- Aloosy, “Intelligent detection system for a distributed denial-of-service (ddos) attack based on time series,” in 2023 15th International Conference on Developments in eSystems Engineering (DeSE), pp. 445–450, IEEE, 2023.
  18. M. M. AL-Ani, N. Omar, and A. A. Nafea, “A hybrid method of long short-term memory and auto-encoder architectures for sarcasm detection,” J. Comput. Sci, vol. 17, no. 11, pp. 1093–1098, 2021.