Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

被引:0
|
作者
Anand, Nemalikanti [1 ,2 ]
Saifulla, M. A. [2 ]
Aakula, Pavan Kumar [2 ]
Ponnuru, Raveendra Babu [3 ,4 ]
Patan, Rizwan [5 ]
Reddy, Chegireddy Rama Prakasha [6 ]
机构
[1] BVRIT HYDERABAD Coll Engn Women, Dept Comp Sci & Engn, Hyderabad, India
[2] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad, India
[3] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
[4] Virginia Mil Inst, Dept Comp & Informat Sci, Lexington, VA USA
[5] Kennesaw State Univ, Coll Comp & Software Engn, Marietta, GA USA
[6] Wollega Univ, Coll Engn & Technol, Nekemte, Ethiopia
关键词
data mining; Decision Tree; Random Forest; security of data; SVM; TwinSVM; FRAMEWORK;
D O I
10.1049/cmu2.12879
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion detection systems (IDS). Hence, an innovative IDS framework is introduced that seamlessly integrates the extended Berkeley Packet Filter (eBPF) with powerful machine learning algorithms-specifically Decision Tree (DT), Random Forest (RF), Support Vector Machine (SVM), and TwinSVM-enabling unparalleled real-time detection of DDoS attacks. This cutting-edge solution provides a robust and scalable IDS framework to combat DoS and DDoS threats with high efficiency, leveraging eBPF's capabilities within the Linux kernel to bypass typical user space constraints. The methodology encompasses several key steps: (a) Collection of data from the renowned CIC-IDS-2017 repository; (b) Processing the raw data through a meticulous series of steps, including transmission, cleaning, reduction, and discretization; (c) Utilizing an ANOVA F-test for the extraction of critical features from the preprocessed data; (d) Application of various ML algorithms (DT, RF, SVM, and TwinSVM) to analyze the extracted features for potential intrusion; (e) Implementing an eBPF program to capture network traffic and harness trained model parameters for efficient attack detection directly within the kernel. The experimental results reveal outstanding accuracy rates of 99.38%, 99.44%, 88.73%, and 93.82% for DT, RF, SVM, and TwinSVM, respectively, alongside remarkable precision values of 99.71%, 99.65%, 84.31%, and 98.49%. This high-speed, accurate detection model is ideally suited for high-traffic environments such as data centers. Furthermore, its foundational architecture paves the way for future advancements, including the potential integration of eBPF with XDP to achieve even lower-latency packet processing. The experimental code is available at the GitHub repository link: .
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Machine learning for automatic defence against Distributed Denial of Service attacks
    Seufert, Stefan
    O'Brien, Darragh
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1217 - 1222
  • [2] Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach
    Samom, Premson Singh
    Taggu, Amar
    APPLIED SOFT COMPUTING AND COMMUNICATION NETWORKS, 2021, 187 : 75 - 87
  • [3] Detection of Distributed Denial of Service Attacks using Machine Learning Algorithms in Software Defined Networks
    Meti, Nisharani
    Narayan, D. G.
    Baligar, V. P.
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1366 - 1371
  • [4] Mitigation Services on SDN for Distributed Denial of Service and Denial of Service Attacks Using Machine Learning Techniques
    Ramprasath, J.
    Krishnaraj, N.
    Seethalakshmi, V.
    IETE JOURNAL OF RESEARCH, 2024, 70 (01) : 70 - 81
  • [5] Detecting Denial of Service attacks using machine learning algorithms
    Kumari, Kimmi
    Mrunalini, M.
    JOURNAL OF BIG DATA, 2022, 9 (01)
  • [6] Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques
    Sudar, K. Muthamil
    Beulah, M.
    Deepalakshmi, P.
    Nagaraj, P.
    Chinnasamy, P.
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [7] Detecting Denial of Service attacks using machine learning algorithms
    Kimmi Kumari
    M. Mrunalini
    Journal of Big Data, 9
  • [8] Distributed Denial of Service (DDoS) Attacks Detection Using Machine Learning Prototype
    Hoyos Ll, Manuel S.
    Isaza E, Gustavo A.
    Velez, Jairo I.
    Castillo O, Luis
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, (DCAI 2016), 2016, 474 : 33 - 41
  • [9] Performance Evaluation of Machine Learning Algorithms for Hypertext Transfer Protocol Distributed Denial of Service Intrusion Detection
    Umar, Rukayya
    Olalere, Morufu
    Idris, Ismaila
    Egigogo, Raji Abdullahi
    Bolarin, G.
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [10] Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks
    Das, Saikat
    Ashrafuzzaman, Mohammad
    Sheldon, Frederick T.
    Shiva, Sajjan
    ALGORITHMS, 2024, 17 (03)