Security is one of the most challenging conditions for dispersed networks because exclusive threats can damage output overall and can be classified in several ways. At this time, distributed denial-of-service (DDoS) assaults pose the greatest threat to internet security. Rapid identification of communication records for messages referencing DDoS occurrences enables organizations to take preventative action by instantly identifying both positive and negative attitudes in cyberspace. This research suggests a method for locating such assaults. The method includes the use of deep learning models that had been trained on the present dataset using Bi Long Short-Term Memory (Bi LSTM). Our model beats more established machine learning techniques, according to the experimental data.The method includes the use of deep learning models that had been trained on the present dataset using Bi Long Short-Term Memory (Bi LSTM). Our model beats more established machine learning techniques, according to the experimental data. Experimental results showed that the proposed technique could achieve an accuracy of 96.7%, making it the best option for use in the detection of breaches applications.
Keywords
Long Short Term Memory, DDoS attack, SVM, Random Forest.
T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the DoS and DDoS problems,” ACM Computing Surveys, vol. 39, no. 1, p. 3, Apr. 2007, doi: 10.1145/1216370.1216373.
J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, Apr. 2004, doi: 10.1145/997150.997156.
K. Sonar, and H. Upadhyay, “A survey: DDOS attack on Internet of Things,” International Journal of Engineering Research and Development, vol. 10, no. 11, pp.58-63, 2014.
X. Yuan, C. Li, and X. Li, “DeepDefense: Identifying DDoS Attack via Deep Learning,” 2017 IEEE International Conference on Smart Computing (SMARTCOMP), May 2017, doi: 10.1109/smartcomp.2017.7946998.
K. SaiSravani and P. Raja Rajeswari, “Prediction Of Stock Market Exchange Using LSTM Algorithm,” International Journal of Scientific and Technology Research, vol. 9, no. 3, pp.417-421, 2020.
Y.-S. Choi, J.-T. Oh, J.-S. Jang, and J.-C. Ryou, “Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention,” 2010 2nd International Conference on Information Technology Convergence and Services, Aug. 2010, doi: 10.1109/itcs.2010.5581263.
L. Sun, Z. Li, Q. Yan, W. Srisa-an, and Y. Pan, “SigPID: significant permission identification for android malware detection,” 2016 11th International Conference on Malicious and Unwanted Software (MALWARE), Oct. 2016, doi: 10.1109/malware.2016.7888730.
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection,” Pattern Recognition Letters, vol. 51, pp. 1–7, Jan. 2015, doi: 10.1016/j.patrec.2014.07.019.
K. Johnson Singh, K. Thongam, and T. De, “Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks,” Entropy, vol. 18, no. 10, p. 350, Oct. 2016, doi: 10.3390/e18100350.
I. Mihai-Gabriel and P. Victor-Valeriu, “Achieving DDoS resiliency in a software defined network by intelligent risk assessment based on neural networks and danger theory,” 2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI), Nov. 2014, doi: 10.1109/cinti.2014.7028696.
T. Chin, X. Mountrouidou, X. Li, and K. Xiong, “Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN),” 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, Jun. 2015, doi: 10.1109/icdcsw.2015.27.
X. Xu, Y. Sun, and Z. Huang, “Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning,” Lecture Notes in Computer Science, pp. 196–207, doi: 10.1007/978-3-540-71549-8_17.
K. V S S R Murthy and K. V V Satyanarayana, “Intrusion detection mechanism with machine learning process A case study with FMIFSSVM, FLCFSSVM, misuses SVM, anomaly SVM and Bayesian methods,” International Journal of Engineering & Technology, vol. 7, no. 2.7, p. 277, Mar. 2018, doi: 10.14419/ijet.v7i2.7.10597.
Toeshik Shon, Yongdae Kim, Cheolwon Lee, and Jongsub Moon, “A machine learning framework for network anomaly detection using SVM and GA,” Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., doi: 10.1109/iaw.2005.1495950.
V. Ramani Varanasi, “A Comparative Evaluation of supervised and unsupervised algorithms for Intrusion Detection,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 4, pp. 4834–4843, Aug. 2020, doi: 10.30534/ijatcse/2020/9394202.
A. D. Jadhav and V. Pellakuri, “Intrusion Detection System Using Machine Learning Techniques for Increasing Accuracy and Distributed & Parallel Approach for Increasing Efficiency,” 2019 5th International Conference On Computing, Communication, Control And Automation (ICCUBEA), Sep. 2019, doi: 10.1109/iccubea47591.2019.9128620.
D. Bhavana, K. Kishore Kumar, V. Chilakala, H. G. Chithirala and T. R. Meka, “A Comparison Of Various Machine Learning Algorithms In Designing An Intrusion Detection System,” International Journal of Scientific and Technology Research, vol. 8, no. 12, pp.2407-2413, 2019.
Acknowledgements
Author(s) thanks to Dr. Prashanthkumar Shukla for this research completion and Data validation support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Jeevan Pradeep K
Jeevan Pradeep K
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Jeevan Pradeep K and Prashanthkumar Shukla, “DDOS Attack Packet Detection and Prevention On a Large-Scale Network Utilising the Bi-Directional Long Short Term Memory Network”, Journal of Machine and Computing, pp. 105-113, January 2024. doi: 10.53759/7669/jmc202404011.