Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms

被引:0
|
作者
Anand, Nemalikanti [1 ,2 ]
Saifulla, M. A. [2 ]
Aakula, Pavan Kumar [2 ]
Ponnuru, Raveendra Babu [3 ,4 ]
Patan, Rizwan [5 ]
Reddy, Chegireddy Rama Prakasha [6 ]
机构
[1] BVRIT HYDERABAD Coll Engn Women, Dept Comp Sci & Engn, Hyderabad, India
[2] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad, India
[3] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
[4] Virginia Mil Inst, Dept Comp & Informat Sci, Lexington, VA USA
[5] Kennesaw State Univ, Coll Comp & Software Engn, Marietta, GA USA
[6] Wollega Univ, Coll Engn & Technol, Nekemte, Ethiopia
关键词
data mining; Decision Tree; Random Forest; security of data; SVM; TwinSVM; FRAMEWORK;
D O I
10.1049/cmu2.12879
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion detection systems (IDS). Hence, an innovative IDS framework is introduced that seamlessly integrates the extended Berkeley Packet Filter (eBPF) with powerful machine learning algorithms-specifically Decision Tree (DT), Random Forest (RF), Support Vector Machine (SVM), and TwinSVM-enabling unparalleled real-time detection of DDoS attacks. This cutting-edge solution provides a robust and scalable IDS framework to combat DoS and DDoS threats with high efficiency, leveraging eBPF's capabilities within the Linux kernel to bypass typical user space constraints. The methodology encompasses several key steps: (a) Collection of data from the renowned CIC-IDS-2017 repository; (b) Processing the raw data through a meticulous series of steps, including transmission, cleaning, reduction, and discretization; (c) Utilizing an ANOVA F-test for the extraction of critical features from the preprocessed data; (d) Application of various ML algorithms (DT, RF, SVM, and TwinSVM) to analyze the extracted features for potential intrusion; (e) Implementing an eBPF program to capture network traffic and harness trained model parameters for efficient attack detection directly within the kernel. The experimental results reveal outstanding accuracy rates of 99.38%, 99.44%, 88.73%, and 93.82% for DT, RF, SVM, and TwinSVM, respectively, alongside remarkable precision values of 99.71%, 99.65%, 84.31%, and 98.49%. This high-speed, accurate detection model is ideally suited for high-traffic environments such as data centers. Furthermore, its foundational architecture paves the way for future advancements, including the potential integration of eBPF with XDP to achieve even lower-latency packet processing. The experimental code is available at the GitHub repository link: .
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Detection of Denial of Service Attacks against Domain Name System Using Machine Learning Classifiers
    Rastegari, Samaneh
    Saripan, M. Iqbal
    Rasid, Mohd Fadlee A.
    WORLD CONGRESS ON ENGINEERING, WCE 2010, VOL I, 2010, : 444 - 447
  • [42] CNN-Based Network Intrusion Detection against Denial-of-Service Attacks
    Kim, Jiyeon
    Kim, Jiwon
    Kim, Hyunjung
    Shim, Minsun
    Choi, Eunjung
    ELECTRONICS, 2020, 9 (06) : 1 - 21
  • [43] Distributed denial-of-service (DDOS) attack detection using supervised machine learning algorithms
    S. Abiramasundari
    V. Ramaswamy
    Scientific Reports, 15 (1)
  • [44] APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks
    Seo, Dongwon
    Lee, Heejo
    Perrig, Adrian
    COMPUTERS & SECURITY, 2013, 39 : 366 - 385
  • [45] Distributed Denial of Service Detection Using Hybrid Machine Learning Technique
    Barati, Mehdi
    Abdullah, Azizol
    Udzir, Nur Izura
    Mahmod, Ramlan
    Mustapha, Norwati
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 268 - 273
  • [46] Distributed denial of service attack detection using machine learning classifiers
    Gautam, R.
    Padmavathy, R.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2024, 46 (03)
  • [47] Survey on new solutions against distributed denial of service attacks
    Sun, Chang-Hua
    Liu, Bin
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2009, 37 (07): : 1562 - 1570
  • [48] A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed ) Denial of Service Attacks
    Malliga, S.
    Nandhini, P. S.
    Kogilavani, S. V.
    INFORMATION TECHNOLOGY AND CONTROL, 2022, 51 (01): : 180 - 215
  • [49] Characterization of defense mechanisms against distributed denial of service attacks
    Chen, LC
    Longstaff, TA
    Carley, KM
    COMPUTERS & SECURITY, 2004, 23 (08) : 665 - 678
  • [50] A Cooperative Mechanism to Defense Against Distributed Denial of Service Attacks
    Beitollahi, Hakem
    Deconinck, Geert
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 11 - 20