Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

被引:0
|
作者
Anand, Nemalikanti [1 ,2 ]
Saifulla, M. A. [2 ]
Aakula, Pavan Kumar [2 ]
Ponnuru, Raveendra Babu [3 ,4 ]
Patan, Rizwan [5 ]
Reddy, Chegireddy Rama Prakasha [6 ]
机构
[1] BVRIT HYDERABAD Coll Engn Women, Dept Comp Sci & Engn, Hyderabad, India
[2] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad, India
[3] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
[4] Virginia Mil Inst, Dept Comp & Informat Sci, Lexington, VA USA
[5] Kennesaw State Univ, Coll Comp & Software Engn, Marietta, GA USA
[6] Wollega Univ, Coll Engn & Technol, Nekemte, Ethiopia
关键词
data mining; Decision Tree; Random Forest; security of data; SVM; TwinSVM; FRAMEWORK;
D O I
10.1049/cmu2.12879
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion detection systems (IDS). Hence, an innovative IDS framework is introduced that seamlessly integrates the extended Berkeley Packet Filter (eBPF) with powerful machine learning algorithms-specifically Decision Tree (DT), Random Forest (RF), Support Vector Machine (SVM), and TwinSVM-enabling unparalleled real-time detection of DDoS attacks. This cutting-edge solution provides a robust and scalable IDS framework to combat DoS and DDoS threats with high efficiency, leveraging eBPF's capabilities within the Linux kernel to bypass typical user space constraints. The methodology encompasses several key steps: (a) Collection of data from the renowned CIC-IDS-2017 repository; (b) Processing the raw data through a meticulous series of steps, including transmission, cleaning, reduction, and discretization; (c) Utilizing an ANOVA F-test for the extraction of critical features from the preprocessed data; (d) Application of various ML algorithms (DT, RF, SVM, and TwinSVM) to analyze the extracted features for potential intrusion; (e) Implementing an eBPF program to capture network traffic and harness trained model parameters for efficient attack detection directly within the kernel. The experimental results reveal outstanding accuracy rates of 99.38%, 99.44%, 88.73%, and 93.82% for DT, RF, SVM, and TwinSVM, respectively, alongside remarkable precision values of 99.71%, 99.65%, 84.31%, and 98.49%. This high-speed, accurate detection model is ideally suited for high-traffic environments such as data centers. Furthermore, its foundational architecture paves the way for future advancements, including the potential integration of eBPF with XDP to achieve even lower-latency packet processing. The experimental code is available at the GitHub repository link: .
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A Novel Mechanism for Detection of Distributed Denial of Service Attacks
    Sen, Jaydip
    ADVANCED COMPUTING, PT III, 2011, 133 : 247 - 257
  • [32] Distributed Detection and Response for the Mitigation of Distributed Denial of Service Attacks
    Grant, D. C.
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 495 - 497
  • [33] Detection and Prevention of Distributed Denial of Service Attacks in VANETs
    Shabbir, Munazza
    Khan, Muazzam A.
    Khan, Umair Shafiq
    Saqib, Nazar A.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 970 - 974
  • [34] A mechanism for detection and prevention of distributed denial of service attacks
    Sen, Jaydip
    Chowdhury, Piyali Roy
    Sengupta, Indranil
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 139 - 144
  • [35] A Review on Detection Approaches for Distributed Denial of Service Attacks
    Chaudhari, Rutika S.
    Talmale, G. R.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, : 323 - 327
  • [36] Enhancing Network Security: A Hybrid Approach for Detection and Mitigation of Distributed Denial-of-Service Attacks Using Machine Learning
    Shohan, Nizo Jaman
    Tanbhir, Gazi
    Elahi, Faria
    Ullah, Ahsan
    Sakib, Md Nazmus
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2023, PT II, 2024, 2091 : 81 - 95
  • [37] Detection of Distributed Denial of Service Attacks through a Combination of Machine Learning Algorithms over Software Defined Network Environment
    AlMomin, Hasen
    Ibrahim, Abdullahi Abdu
    2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020), 2020, : 79 - 82
  • [38] Central Aggregator Intrusion Detection System for Denial of Service Attacks
    Ahmad, Sajjad
    Raza, Imran
    Jamal, M. Hasan
    Djuraev, Sirojiddin
    Hur, Soojung
    Ashraf, Imran
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 2363 - 2377
  • [39] Denial of Service Attacks: Detecting the Frailties of Machine Learning Algorithms in the Classification Process
    Frazao, Ivo
    Abreu, Pedro Henriques
    Cruz, Tiago
    Araujo, Helder
    Simoes, Paulo
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2018), 2019, 11260 : 230 - 235
  • [40] Proactive Intrusion Detection and Distributed Denial of Service Attacks - A Case Study in Security Management
    Cabrera J.B.D.
    Lewis L.
    Qin X.
    Lee W.
    Mehra R.K.
    Journal of Network and Systems Management, 2002, 10 (02) : 225 - 254