The rest of the paper is structured as follows.
Section 2 presents related works. Section 3 presents
the methodology. Section 4 presents the results, while
section 5 concludes the paper.
2 RELATED WORKS
This section provides an overview of several previous
research papers on DDoS detection using machine
learning methods.
Ashi et al. (2020) investigated DDoS attacks
detection with an emphasis on cloud computing
architecture. After collecting 256 Uniform Resource
Locators, the authors used four different systems to
simulate a DDoS attack simultaneously (URLs). A
dataset comprising the simulation's network traffic
flow was created, and Random Forest (RF) was
utilized for model testing.
Rahman et al. (2019) created an SDN framework
to identify and defend against DDoS attacks on the
controller and the switch. To predict DDoS attacks,
this framework requires training a machine learning
model with recorded data. The mitigation script then
uses the prediction to make decisions on the SDN
network. With an open-source DDoS dataset, they
tested and compared the results for Support Vector
Machine (SVM), K-Nearest neighbours (K-NN), J48,
and RF. The results of their experiment revealed that
J48 is the best classifier with accuracy, F-1, and recall
rate of 100%.
Reddy and Thilagam (2020) applied Naive Bayes
(NB) classifier to detect DDoS attack traffic by
considering the five most influential DDoS attack
network factors. Based on the probability of the
DDoS attack value, the proposed DDoS attack
classifier is applied on all monitor nodes to process
valid traffic and remove DDoS attack traffic.
According to simulation results, the proposed strategy
reduces the intensity of DDoS attacks and allows
network nodes to handle up to 80% of legal traffic.
Misbahuddin and Zaidi (2021) classified DDoS
attacks by using a semi-supervised machine learning
approach on the CICDS2017 dataset. They began
with unlabelled traffic information collected against
three aspects for victim-end defence, namely the
webserver. Two distinct clustering methods were
used to group unlabelled data, and a voting procedure
determines the final classification of traffic flows. To
detect DDoS attacks, the supervised learning
algorithms K-NN, SVM and RF are applied to
labelled data, with accuracy achieved of 95%, 92%,
and 96.66%, respectively.
Rios et al. (2021) tested and compared the Multi-
Layer Perceptron (MLP), K-NN, SVM, and
Multinomial Naive Bayes (MNB) machine learning
methods for detecting reduction of quality (RoQ)
attacks. They also suggested a method for detecting
RoQ attacks that combines three models: Fuzzy Logic
(FL), MLP, and Euclidean Distance (ED). They
tested these methods using both simulated and real-
world traffic patterns. They demonstrated that using
three parameters, namely the number of packets,
entropy, and average inter-arrival time, results in the
better categorization of the four machine learning
algorithms than using only entropy. MLP
outperformed the other four machine learning
algorithms when it comes to detecting RoQ attacks.
Doshi, et al. (2018) investigated multiple machine
learning algorithms K-NN, Linear SVM, Decision
Tree (DT), RF and Neural Network (NN) for DDoS
detection for consumer IoT. Their classification
algorithm was based on the idea that system traffic
conditions from these IoT nodes differ from those
from well-studied non-IoT network nodes. They used
data from a consumer IoT device that included both
normal and DoS attack traffic to test five different
machine learning classifiers. The results show
variations in accuracy, F1, recall, and precision across
the models. With K-NN, DT, RF, and NN having
99.9% accuracy while LSVM 99.1%.
Mishra et al (2021) investigated DDoS attacks
detection in cloud computing. The machine learning
algorithms adopted for classification were K-NN, NB
and RF. They generated a long feature vector by
merging all feature vectors of interest. Their focus
was more on supervised learning with the Random
Forest having the best accuracy of 99.58%.
Hekmati et al. (2021) proposed a simple Feed-
forward Neural Network for DDoS detection
employing 20 nodes out of 4060 in the original
dataset for the Urban IoT DDoS dataset. They also
provide a script for creating a benign dataset from the
original dataset to eliminate bias toward nodes with
higher activity. The authors used attack emulation to
generate an artificial DDoS attack for the attack ratio
of 1 on the 20 selected IoT nodes. The simple FNN
achieved a mean accuracy of 94% and 88% on the
train and test data, respectively.
Shaaban et al. (2019) proposed the use of a
Convolutional Neural Network (CNN) for DDoS
detection. For their research, the authors used two
datasets: a generated dataset and the NSL-KDD
dataset. The results showed that CNN achieved 99%
accuracy, and outperformed other algorithms like DT,
SVM, K-NN and NN.