An Uncertain Reasoning-Based Intrusion Detection System for
DoS/DDoS Detection
Harpreet Singh
1
, Habib Louafi
2 a
and Yiyu Yao
1 b
1
Department of Computer Science, University of Regina, Regina, SK, Canada
2
Department of Science and Technology, TELUQ University, Montreal, QC, Canada
fi
Keywords:
IDS, DoS, DDoS, Bayesian Networks, Markov Networks, Machine Learning, Artificial Intelligence.
Abstract:
Network intrusion detection systems (NIDS) play an important role in cybersecurity, but they face obstacles
such as unpredictability and computational complexity. To solve these challenges, we propose a novel prob-
abilistic NIDS that detects DoS and DDoS attacks carried out on the TCP, UDP, and ICMP protocols. Our
method incorporates knowledge from the fields of these protocols using Bayesian networks (BN) and Markov
networks (MN). Inference is performed using Variable Elimination (VE) for BN and Shafer-Shenoy (SS)
Propagation, as well as Lazy Propagation (LP) for MN. Extensive tests on the CAIDA dataset have yielded
promising results, with higher Precision, Recall, and F1-Score metrics. Notably, both SS and LP are efficient,
demonstrating the effectiveness of our proposed NIDS in improving network security.
1 INTRODUCTION
Computers and devices connected to the Internet use
the Open Systems Interconnect (OSI) model to com-
municate with each other, whether the connection is
wired (Zimmermann, 1980) or wireless (Korolkov
and Kutsak, 2021). Each layer of the OSI model can
be attacked differently by numerous types of attacks,
such as Denial of Service (DoS) and Distributed De-
nial of Service (DDoS) attacks, which are termed as
the most catastrophic ones (Jaafar et al., 2019).
This paper focuses on securing network assets and
safeguarding crucial data held on internet-connected
devices and servers. DoS/DDoS attacks, which ex-
ploit basic protocols such as TCP, UDP, and ICMP
with modifications, present significant issues due
to their stealth and resource consumption. Intru-
sion Detection Systems (IDS) play an important
role in minimizing such attacks by scanning net-
work traffic for malicious activity. IDS has two de-
tection methods: signature-based, which relies on
known attack patterns, and anomaly-based, which
uses models of typical behaviour to detect devia-
tions. While signature-based detection is confined
to known threats, anomaly-based detection provides
greater coverage by identifying any aberrant net-
a
https://orcid.org/0000-0002-3247-3115
b
https://orcid.org/0000-0001-6502-6226
work behaviour for further investigation (Yassin et al.,
2014).
In this paper, a behaviour-based IDS model is pro-
posed for the detection of DoS/DDoS attacks, us-
ing uncertain reasoning in Artificial Intelligence (AI).
Precisely, the proposed model uses Bayesian net-
works (BN), which are based on Probability theory
and Uncertainty (Pearl, 1998). Without loss of gen-
erality, in this paper, we focus on the detection of
DoS/DDoS attacks that exploit three widely used and
targeted protocols, namely TCP, UDP, and ICMP.
Thus, the knowledge representation of the BN is
based on the fields that comprise these three proto-
cols.
To achieve that goal, we propose a robust
methodology for identifying malicious network traffic
frames utilizing Bayesian network (BN) algorithms.
Through rigorous implementation, testing, and vali-
dation, the paper evaluates the performance of three
distinct algorithms: Variable Elimination (VE) for
exact inference, Shafer-Shenoy propagation (SS) for
message propagation, and Lazy Propagation (LP) for
hybrid inference. These contributions collectively ad-
vance the state-of-the-art in intrusion detection sys-
tems and bolster network security measures.
The paper is organized as follows, Section 2, re-
views the proposed solutions related to intrusion de-
tection using AI algorithms. Section 3, presents the
methodology of our proposed solution. Sections 4,
Singh, H., Louafi, H. and Yao, Y.
An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection.
DOI: 10.5220/0012794400003767
Paper published under CC license (CC BY-NC-ND 4.0)
In Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024), pages 771-776
ISBN: 978-989-758-709-2; ISSN: 2184-7711
Proceedings Copyright © 2024 by SCITEPRESS – Science and Technology Publications, Lda.
771