Skip to main content
Log in

An efficient DDoS attack detection and categorization using adolescent identity search-based weighted SVM model

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Distributed Denial of service (DDoS) is the most frequent as well as serious attack that causes serious threats to new-generation communication networks. In recent times, the detection of DDoS attacks becomes a complicated task due to high computation complexities. Several classification approaches are developed by the researchers to detect and resolve the attacks but they hardly discriminate between legitimate and attack traffics independently. In order to deal with the issue here we designed a novel DDOS detection system using the proposed weighted support vector machine kernel-based Adolescent Identity Search algorithm-Random forest (wSVMAS-RF) approach that effectively and accurately detects and classifies the malicious and benign data separately. To evaluate the proposed wSVMAS-RF approach, two modern datasets namely CICDDoS2019 and CICDoS2017 are utilized. The proposed wSVMAS-RF approach is an ensemble method that detects the DDoS attacks in transportation and application layers of the network efficiently. Before classification, the raw datasets are preprocessed using different pipelines to enhance the quality of data. In this, the dimension reduction process is executed using the Interval reduced kernel principal component analysis (IRKPCA) which helps to preserve significant data in the datasets. The proposed wSVMAS-RF approach’s efficiency is investigated by evaluating its detection performance with other state of art approaches in terms of diverse evaluation measures namely F-measure, detection rate, false positive rate, accuracy, precision and recall. The experimental results of the proposed method attained an accuracy of about 99% for the CICDoS2017 dataset and 99.74% for the CICDDoS2019 dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

Code availability

Not applicable.

References

  1. Almaraz-Rivera JG, Perez-Diaz JA, Cantoral-Ceballos JA (2022) Transport and application layer DDoS attacks detection to IoT devices by using machine learning and deep learning models. Sensors 22(9):3367. https://doi.org/10.3390/s22093367

    Article  Google Scholar 

  2. Beitollahi H, Sharif D, Fazeli M (2022) Application layer DDoS attack detection using Cuckoo Search algorithm-trained Radial Basis Function. IEEE Access

  3. Sambangi S, Gondi L (2020) A machine learning approach for DDoS (distributed denial of service) attack detection using multiple linear regression. Proceedings 63(1):51. MDPI

  4. Lima Filho FSD, Silveira FA, de Medeiros Brito Junior A, Vargas-Solar G, Silveira LF (2019) Smart detection: an online approach for DoS/DDoS attack detection using machine learning. Secur Commun Netw 2019

  5. Shurman MM, Khrais RM, Yateem AA (2020) DoS and DDoS attack detection using deep learning and IDS. Int Arab J Inf Technol 17(4A):655–661

    Google Scholar 

  6. Bishnoi S, Mohanty S, Sahoo B. (2021) A deep learning-based methodology in fog environment for DDOS attack detection. In: 2021 5th International conference on computing methodologies and communication (ICCMC). (pp. 201–206). IEEE

  7. Ortet Lopes I, Zou D, Ruambo FA, Akbar S, Yuan B (2021) Towards effective detection of recent DDoS attacks: A deep learning approach. Secur Commun Netw 2021

  8. Liu T, Sabrina F, Jang-Jaccard J, Xu W, Wei Y (2021) Artificial intelligence-enabled DDoS detection for blockchain-based smart transport systems. Sensors 22(1):32

    Article  Google Scholar 

  9. Liang X, Kim Y (2021) A survey on security attacks and solutions in the IoT network. In: 2021 IEEE 11th Annual computing and communication workshop and conference (CCWC). IEEE, p 0853–0859

  10. Shah A, Rathod D, Dave D (2021) DDoS attack detection using artificial neural network. In: International conference on computing science, communication and security. Springer, Cham, p 46–66

  11. Hosseini S, Azizi M (2019) The hybrid technique for DDoS detection with supervised learning algorithms. Comput Netw 158:35–45

    Article  Google Scholar 

  12. Gao Y, Wu H, Song B, Jin Y, Luo X, Zeng X (2019) A distributed network intrusion detection system for distributed denial of service attacks in vehicular ad hoc network. IEEE Access 7:154560–154571

    Article  Google Scholar 

  13. Çakmakçı SD, Kemmerich T, Ahmed T, Baykal N (2020) Online DDoS attack detection using Mahalanobis distance and Kernel-based learning algorithm. J Netw Comput Appl. 168:102756. https://doi.org/10.1016/j.jnca.2020.102756

    Article  Google Scholar 

  14. Kshirsagar D, Kumar S (2022) A feature reduction based reflected and exploited DDoS attacks detection system. J Ambient Intell Humaniz Comput 13(1):393–405

    Article  Google Scholar 

  15. Praseed A, Thilagam PS (2019) Multiplexed asymmetric attacks: Next-generation DDoS on HTTP/2 servers. IEEE Trans Inf Forensics Secur 15:1790–1800

    Article  Google Scholar 

  16. Yungaicela-Naula NM, Vargas-Rosales C, Perez-Diaz JA (2021) SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access 9:108495–108512

    Article  Google Scholar 

  17. Novaes MP, Carvalho LF, Lloret J, Proença ML Jr (2021) Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments. Futur Gener Comput Syst 125:156–167. https://doi.org/10.1016/j.future.2021.06.047

    Article  Google Scholar 

  18. Sambangi S, Gondi L (2020) A machine learning approach for DDoS (distributed denial of service) attack detection using multiple linear regressions. Proceedings 63(1):51. MDPI

  19. Harkat MF, Mansouri M, Nounou M, Nounou H (2019) Fault detection of the uncertain nonlinear process using an interval-valued data-driven approach. Chem Eng Sci 205:36–45

    Article  MATH  Google Scholar 

  20. Kouziokas GN (2020) A new W-SVM kernel combining PSO-neural network transformed vector and Bayesian optimized SVM in GDP forecasting. Eng Appl Artif Intell 92:103650

    Article  Google Scholar 

  21. Bogar E, Beyhan S (2020) Adolescent Identity Search Algorithm (AISA): A novel metaheuristic approach for solving optimization problems. Appl Soft Comput 95:106503

    Article  Google Scholar 

  22. Zhou X, Xu X, Zhang J, Wang L, Wang D, Zhang P (2022) Fault diagnosis of silage harvester based on a modified random forest. Inf Process Agric

  23. Haider S, Akhunzada A, Mustafa I, Patel TB, Fernandez A, Choo KKR, Iqbal J (2020) A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks. Ieee Access 8:53972–53983

    Article  Google Scholar 

  24. Firdaus D, Munadi R, Purwanto Y (2020) DDoS attack detection in software defined network using ensemble K-means++ and random forest. In: 2020 3rd international seminar on research of information technology and intelligent systems (ISRITI). IEEE, p 164–169

  25. Maheshwari A, Mehraj B, Khan MS, Idrisi MS (2022) An optimized weighted voting based ensemble model for DDoS attack detection and mitigation in SDN environment. Microprocess Microsyst 89:104412

    Article  Google Scholar 

  26. Velliangiri S, Karthikeyan P, Vinoth Kumar V (2021) Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. J Exp Theor Artif Intell 33(3):405–424. https://doi.org/10.1080/0952813X.2020.1744196

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

All authors agreed on the content of the study. RB and EB collected all the data for analysis. RB agreed on the methodology. RB and EB completed the analysis based on agreed steps. Results and conclusions are discussed and written together. The author read and approved the final manuscript.

Corresponding author

Correspondence to R. Barona.

Ethics declarations

Competing interests

The authors declare no competing interests.

Ethics approval

This article does not contain any studies with human participants.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Barona, R., Baburaj, E. An efficient DDoS attack detection and categorization using adolescent identity search-based weighted SVM model. Peer-to-Peer Netw. Appl. 16, 1227–1241 (2023). https://doi.org/10.1007/s12083-023-01460-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01460-6

Keywords

Navigation