DDoS Attack Preventing and Detection with the Artificial Intelligence Approach

  • Conference paper
  • First Online:
Intelligent Computing Systems (ISICS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1569))

Included in the following conference series:

  • 230 Accesses

Abstract

DDoS attacks are a major Internet security concern with this large number of customers. Each attack sends a service request to a certain server, which limits the server’s capacity to provide normal services. Since the attackers use legitimate packages and alter their package information, traditional methods are not very effective. The assault on DDoS is one of the most potent Internet hacking techniques. The hacker’s basic weapon to take down and crash websites during these sorts of assaults is network trafficking. There are different sub-categories, each category explains how a hacker attempts to enter the network. In this paper, we define the DDoS attacks detection method based on artificial intelligence and explored with more than 96-percent accuracy a technique to detect a DDoS attacks assault danger using artificial intelligence (A.I). In addition to a secure or healthy network, authors have identified 7 separate sub-categories of DDoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yuan, X., Li, C., Li, X.: DeepDefense: identifying DDoS attack via deep learning. In: 2017 IEEE International Conference on Smart Computing (SMARTCOMP), Hong Kong, 2017, pp. 1–8 (2017). https://doi.org/10.1109/SMARTCOMP.2017.7946998

  2. Guri, M., Mirsky, Y., Elovici,Y.: 9-1-1 DDoS: attacks, analysis and mitigation. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, 2017, pp. 218–232 (2017). https://doi.org/10.1109/EuroSP.2017.23

  3. Hsieh, C.J., Chan, T.Y.: Detection DDoS attacks based on neural-network using Apache Spark. In: 2016 International Conference on Applied System Innovation (ICASI), Okinawa, 2016, pp. 1–4 (2016). https://doi.org/10.1109/ICASI.2016.7539833

  4. Kiruthika Devi, B.S., Preetha, G., Selvaram, G., Mercy Shalinie, S.: An impact analysis: real time DDoS attack detection and mitigation using machine learning. In: 2014 International Conference on Recent Trends in Information Technology, Chennai, 2014, pp. 1–7 (2014). https://doi.org/10.1109/ICRTIT.2014.6996133

  5. Meitei, I.L., Singh, K.J., De, T.: Detection of DDoS DNS amplification attack using classification algorithm. In: Proceedings of the International Conference on Informatics and Analytics (ICIA-16), Article 81, p. 6. ACM, New York, NY, The USA (2016). https://doi.org/10.1145/2980258.2980431

  6. Ramadhan, G., Kurniawan, Y., Kim, C.-S.: Design of TCP SYN flood DDoS attack detection using artificial immune systems. In: 2016 6th International Conference on System Engineering and Technology (ICSET), Bandung, 2016, pp. 72–76 (2016). https://doi.org/10.1109/ICSEngT.2016.7849626

  7. Rish, I.: An empirical study of the naive Bayes classifier. J. Univ. Comput. Sci. 1(2), 127 (2001)

    Google Scholar 

  8. Ahmad, I., Abdullah, A.B., Alghamdi, A.S.: Artificial neural network approaches to intrusion detection: a review. In: WSEAS International Conference on Telecommunications and Informatics World Scientific and Engineering Academy and Society (WSEAS), pp. 200–205 (2009)

    Google Scholar 

  9. Zhang, B., Tao, Z., Yu, Z.: DDoS detection and prevention based on artificial intelligence techniques. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC). IEEE (2017)

    Google Scholar 

  10. Zhao, T., Lo, D.C.T., Qian, K.: A neural-network based DDoS detection system using hadoop and HBase. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, 2015, pp. 1326–1331 (2015). https://doi.org/10.1109/HPCC-CSS-ICESS.2015.38

  11. Ndibwile, J.D., Govardhan, A., Okada, K., Kadobayashi,Y.: Web server protection against application layer DDoS attacks using machine learning and traffic authentication. In: 2015 IEEE 39th Annual Computer Software and Applications Conference, Taichung, 2015, pp. 261–267 (2015). https://doi.org/10.1109/COMPSAC.2015.240

  12. Fouladi, R.F., Kayatas, C.E., Anarim, E.: Frequency based DDoS attack detection approach using naive Bayes classification. In: 2016 39th International Conference on Telecommunications and Signal Processing (TSP), Vienna, 2016, pp. 104–107 (2016). https://doi.org/10.1109/TSP.2016.7760838

  13. Peraković, D., Periša, M., Cvitić, I., Husnjak, S.: Artificial neuron network implementation in detection and classification of DDoS traffic. In: 2016 24th Telecommunications Forum (TELFOR), Belgrade, pp. 1–4 (2016). https://doi.org/10.1109/TELFOR.2016.7818791

  14. Kushnir, M., et al.: Automated black box detection of HTTP GET request-based access control vulnerabilities in web applications. In: Man, H., et al. (eds.) ICISSP 2021, JSEFuzz: Vulnerability Detection Method for Java Web Application. 2018 3rd International Conference on System Reliability and Safety (ICSRS), Online 11–13 February 2021. SciTePress (2021)

    Google Scholar 

  15. Anagandula, K., Zavarsky, P.: An analysis of effectiveness of black-box web application scanners in detection of stored SQL injection and stored XSS vulnerabilities. In: 2020 3rd International Conference on Data Intelligence and Security (ICDIS). IEEE (2020)

    Google Scholar 

  16. Aljumah, A., Ahamad, T.: A novel approach for detecting DDoS using artificial neural networks. Int. J. Comput. Sci. Netw. Secur. 16(12), 132–138 (2016)

    Google Scholar 

  17. Deepa, V., Muthamil Sudar, K., Deepalakshmi, P.: Detection of DDoS attack on SDN control plane using hybrid machine learning techniques. In: 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE (2018)

    Google Scholar 

  18. Alzahrani, S., Hong, L.: Detection of Distributed Denial of Service (DDoS) attacks using artificial intelligence on cloud. In: 2018 IEEE World Congress on Services (SERVICES), pp. 35–36 (2018). https://doi.org/10.1109/SERVICES.2018.00031

  19. Bandara, K.R.W.V., et al.: Preventing DDOS attack using data mining algorithms. Int. J. Sci. Res. Publ. 6(10), 390 (2016)

    Google Scholar 

  20. Ghafarian, A.: A hybrid method for detection and prevention of SQL injection attacks. In: 2017 Computing Conference. IEEE (2017)

    Google Scholar 

  21. Mohammadi, M., et al.: Automatic web security unit testing: XSS vulnerability detection. In: 2016 IEEE/ACM 11th International Workshop in Automation of Software Test (AST). IEEE (2016)

    Google Scholar 

  22. Ibarra-Fiallos, S., et al.: Effective filter for common injection attacks in online web applications. IEEE Access 9, 10378–10391 (2021)

    Google Scholar 

  23. Figueiredo, A., Lide, T., Correia, M.: Multi-language web vulnerability detection. In: 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE (2020)

    Google Scholar 

  24. Kao, D.-Y., Lai, C.-J., Su, C.-W.: A framework for SQL injection investigations: detection, investigation, and forensics. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE (2018)

    Google Scholar 

  25. Mokbal, F.M.M., et al.: MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique. IEEE Access 7, 100567–100580 (2019)

    Google Scholar 

  26. Jeevitha, R., Sudha Bhuvaneswari, N.: Malicious node detection in VANET session hijacking attack. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT). IEEE (2019)

    Google Scholar 

  27. Medeiros, I., Neves, N.: Effect of coding styles in detection of web application vulnerabilities. In: 2020 16th European Dependable Computing Conference (EDCC). IEEE (2020)

    Google Scholar 

  28. Li, J., Liu, Y., Lin, G.: DDoS attack detection based on a neural network. In: 2010 2nd International Symposium on Aware Computing. IEEE (2010)

    Google Scholar 

  29. Yuan, H., et al.: Research and implementation of security vulnerability detection in application system of WEB static source code analysis based on JAVA. In: Xu, Z., Choo, K.K., Dehghantanha, A., Parizi, R., Hammoudeh, M. (eds.) The International Conference on Cyber Security Intelligence and Analytics, pp. 444–452. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-15235-2_66

  30. Moustafa, N., Misra, G., Slay, J.: Generalized outlier Gaussian mixture technique based on automated association features for simulating and detecting web application attacks. IEEE Trans. Sustain. Comput. (2018)

    Google Scholar 

  31. The UNIVERSITY OF New BRUNSWICK DDoS evaluation dataset (CIC-DDoS2019). https://www.unb.ca/cic/datasets/ddos-2019.html

  32. Shamoo, A.E., Resnik, D.B.: Responsible Conduct of Research. Oxford University Press, Oxford (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Tariqul Islam , Md. Ismail Jabiullah or Dm. Mehedi Hasan Abid .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Islam, T., Jabiullah, M.I., Abid, D.M.H. (2022). DDoS Attack Preventing and Detection with the Artificial Intelligence Approach. In: Brito-Loeza, C., Martin-Gonzalez, A., Castañeda-Zeman, V., Safi, A. (eds) Intelligent Computing Systems. ISICS 2022. Communications in Computer and Information Science, vol 1569. Springer, Cham. https://doi.org/10.1007/978-3-030-98457-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98457-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98456-4

  • Online ISBN: 978-3-030-98457-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation