Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

被引:0
|
作者
Anand, Nemalikanti [1 ,2 ]
Saifulla, M. A. [2 ]
Aakula, Pavan Kumar [2 ]
Ponnuru, Raveendra Babu [3 ,4 ]
Patan, Rizwan [5 ]
Reddy, Chegireddy Rama Prakasha [6 ]
机构
[1] BVRIT HYDERABAD Coll Engn Women, Dept Comp Sci & Engn, Hyderabad, India
[2] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad, India
[3] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
[4] Virginia Mil Inst, Dept Comp & Informat Sci, Lexington, VA USA
[5] Kennesaw State Univ, Coll Comp & Software Engn, Marietta, GA USA
[6] Wollega Univ, Coll Engn & Technol, Nekemte, Ethiopia
关键词
data mining; Decision Tree; Random Forest; security of data; SVM; TwinSVM; FRAMEWORK;
D O I
10.1049/cmu2.12879
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion detection systems (IDS). Hence, an innovative IDS framework is introduced that seamlessly integrates the extended Berkeley Packet Filter (eBPF) with powerful machine learning algorithms-specifically Decision Tree (DT), Random Forest (RF), Support Vector Machine (SVM), and TwinSVM-enabling unparalleled real-time detection of DDoS attacks. This cutting-edge solution provides a robust and scalable IDS framework to combat DoS and DDoS threats with high efficiency, leveraging eBPF's capabilities within the Linux kernel to bypass typical user space constraints. The methodology encompasses several key steps: (a) Collection of data from the renowned CIC-IDS-2017 repository; (b) Processing the raw data through a meticulous series of steps, including transmission, cleaning, reduction, and discretization; (c) Utilizing an ANOVA F-test for the extraction of critical features from the preprocessed data; (d) Application of various ML algorithms (DT, RF, SVM, and TwinSVM) to analyze the extracted features for potential intrusion; (e) Implementing an eBPF program to capture network traffic and harness trained model parameters for efficient attack detection directly within the kernel. The experimental results reveal outstanding accuracy rates of 99.38%, 99.44%, 88.73%, and 93.82% for DT, RF, SVM, and TwinSVM, respectively, alongside remarkable precision values of 99.71%, 99.65%, 84.31%, and 98.49%. This high-speed, accurate detection model is ideally suited for high-traffic environments such as data centers. Furthermore, its foundational architecture paves the way for future advancements, including the potential integration of eBPF with XDP to achieve even lower-latency packet processing. The experimental code is available at the GitHub repository link: .
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Enhancing DNS resilience against denial of service attacks
    Pappas, Vasileios
    Massey, Dan
    Zhang, Lixia
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 450 - +
  • [22] PFS: Probabilistic Filter Scheduling Against Distributed Denial-of-Service Attacks
    Seo, Dongwon
    Lee, Heejo
    Perrig, Adrian
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 9 - 17
  • [23] Detecting and Reacting against Distributed Denial of Service Attacks
    Bouzida, Yacine
    Cuppens, Frederic
    Gombault, Sylvain
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2394 - 2399
  • [24] Intrusion detection of distributed denial of service attack in cloud
    S. Velliangiri
    J. Premalatha
    Cluster Computing, 2019, 22 : 10615 - 10623
  • [25] Intrusion detection of distributed denial of service attack in cloud
    Velliangiri, S.
    Premalatha, J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
  • [26] Distributed defense against distributed denial-of-service attacks
    Shi, W
    Xiang, Y
    Zhou, WL
    DISTRIBUTED AND PARALLEL COMPUTING, 2005, 3719 : 357 - 362
  • [27] DeepDetect: Detection of distributed denial of service attacks using deep learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    Computer Journal, 2021, 63 (07): : 983 - 994
  • [28] DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    COMPUTER JOURNAL, 2020, 63 (07): : 983 - 994
  • [30] A packet filter placement problem with application to defense against spoofed denial of service attacks
    Armbruster, Benjamin
    Smith, J. Cole
    Park, Kihong
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2007, 176 (02) : 1283 - 1292