skip to main content
10.1145/2980258.2980431acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciaConference Proceedingsconference-collections
research-article

Detection of DDoS DNS Amplification Attack Using Classification Algorithm

Published:25 August 2016Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICIA 2016 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

ABSTRACT

The Domain Name System (DNS) is a critically fundamental element in the internet technology as it translates domain names into corresponding IP addresses. The DNS queries and responses are UDP (User Datagram Protocol) based. DNS name servers are constantly facing threats of DNS amplification attacks. DNS amplification attack is one of the major Distributed Denial of Service (DDoS) attacks, in DNS. The DNS amplification attack victimized huge business and financial companies and organizations by giving disturbance to the customers. In this paper, a mechanism is proposed to detect such attacks coming from the compromised machines. We analysed DNS traffic packet comparatively based on the Machine Learning Classification algorithms such as Decision Tree (TREE), Multi Layer Perceptron (MLP), Naïve Bayes (NB) and Support Vector Machine (SVM) to classify the DNS traffics into normal and abnormal. In this approach attribute selection algorithms such as Information Gain, Gain Ratio and Chi Square are used to achieve optimal feature subset. In the experimental result it shows that the Decision Tree achieved 99.3% accuracy. This model gives highest accuracy and performance as compared to other Machine Learning algorithms.

References

  1. TechNet -- Microsoft, How DNS query works, https://technet.microsoft.com/enus/library/cc779380(v=ws.10).aspxGoogle ScholarGoogle Scholar
  2. Simon Heron, 2007. Working the botnet: how dynamic DNS is revitalising the zombie army Network Security, January 2007, Issue 1, January 2007, pp. 9--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Trace -- SimpleWiki -- The Simpleweb www.simpleweb.org/wiki/Traces. Accessed date 19 November 2015.Google ScholarGoogle Scholar
  4. The CAIDA Anonymized OC48 Internet Traces Dataset http://www.caida.org/data/passive/passive_oc48_dataset.xml. Accessed date 21 November 2015.Google ScholarGoogle Scholar
  5. Khushboo Satpute, S. Agrawal, J. Agrawal, Sanjeev Sharma. A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques. Proc. of Int. Conf. on Front of Intell Comput., AISC 199, pp. 441--452.Google ScholarGoogle Scholar
  6. T. T. Nguyen and G. Armitage, 2008. A Survey of techniques for internet traffic classification using machine learning. Commun. Surveys & Tutorials, vol. 10, no. 4, pp. 56--76, Oct. 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Marios Anagnostopoulos, 2013. DNS Amplification Attack Revisited. Computer & Security, Vol. 39,Part B, November 2013, pp. 475--485. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Claude Fachkha, 2014. Fingerprinting Internet DNS Amplification DDoS Activities. 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014, pp. 1--5.Google ScholarGoogle Scholar
  9. Weizhang Ruan, 2013. Pattern Discovery in DNS Query Traffic. Procedia Computer Science Vol. 17, 2013, pp. 80--87.Google ScholarGoogle ScholarCross RefCross Ref
  10. UzmaSattar, 2013. Secure DNS from amplification attack by using Modified Bloom Filters. Eighth International Conference on Digital Information Management (ICDIM), 2013, pp. 20--23.Google ScholarGoogle Scholar
  11. Georgios Kambourakis, 2007. A Fair Solution to DNS Amplification Attacks. Second International Workshop on Digital Forensics and Incident Analysis (WDFIA), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Boris Sieklik, Richard Macfarlane, William J. Buchanan, 2016. Evaluation of TFTP DDoS amplification attack. Computers and Security, Vol. 57, March 2016, pp. 67--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Choi, H. Lee and H. Kim, 2007. Botnet Detection by Monitoring Group Activities in DNS traffic. 7th IEEE International Conference on Computer and Information Technology (CIT), 2007. pp. 715--720. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ricardo Villamarin Salomon, Jose Carlos Brustoloni. Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic. 5th IEEE Consumer Communications and Networking Conference (CCNC), 2008, pp. 476--481.Google ScholarGoogle Scholar
  15. Tejmani Sinam, Nandarani Ngasham, Pradeep Lamabam, Irengbam Tilokchan Singh, Sukumar Nandi, 2014. Early Detection of VoIP Network Flows based on Sub-Flow Statistical Characteristics of Flows using Machine Learning Techniques. 2014 IEEE International Conference on Advanced Networks and Telecommunications Systems (ATNS), 2014, pp. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  16. Alan Saied, Richard E. Overill, Tomasz Radzik, 2016. Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing, Vol. 172, January 2016, pp. 385--393. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. US-CERT, DNS Amplification attack, https://www.us-cert.gov/ncas/alerts/TA13-088A. Accessed date 23 September 2015.Google ScholarGoogle Scholar
  18. Xi YE, Yiru YE, 2013. A Practical Mechanism to Counteract DNS Amplification DDoS Attacks. Journal of Computational Information Systems, Vol. 9(1), 2013, pp. 265--272.Google ScholarGoogle Scholar
  19. Richard Sharp, Ed Warnicke. Wireshark User's Guide. https://www.wireshark.org/docs/wsug_html_chunked/.Google ScholarGoogle Scholar
  20. Sergios Theodoridis, Konstantinos Kautroumbas. Pattern Recognition. Second Edition.Google ScholarGoogle Scholar
  21. Decision Tree Learining, http://www.ke.tu-darmstadt.de/lehre/archiv/ws0809/mldm/dt.pdf. Accessed date 15 December 2015.Google ScholarGoogle Scholar
  22. T.M. Cover and J.A. Thomas, "Elements of Information Theory", Second Edition.Google ScholarGoogle Scholar
  23. Huan Lui, R. Setiono, 1995. Chi2: feature selection and discretization of numeric attributes. In Proceedings, Seventh International Conference on Tools with Artificial Intelligence, 1995, pp. 388--391. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Bradley, A.P., 1997. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition, Vol. 30(7), 1997, pp. 1145--1159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Lutz Hamel, 2008. Model Assessment with ROC curves. The Encyclopedia of Data Warehousing and Mining, 2nd Edition Idea Group Publishers, 2008.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICIA-16: Proceedings of the International Conference on Informatics and Analytics
    August 2016
    868 pages
    ISBN:9781450347563
    DOI:10.1145/2980258

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 25 August 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader