DDoS Attacks Detection using Machine Learning

dc.contributor.authorSabir, Mohammed Younus
dc.contributor.supervisorGebali, Fayez
dc.date.accessioned2023-04-28T17:07:43Z
dc.date.available2023-04-28T17:07:43Z
dc.date.copyright2023en_US
dc.date.issued2023-04-28
dc.degree.departmentDepartment of Electrical and Computer Engineering
dc.degree.levelMaster of Engineering M.Eng.en_US
dc.description.abstractThe advancement in information technology has created a new era named as Internet of Things (IoT). This new technology has allowed things to be connected to the Internet, for example smart TVs, printers, cameras, smartphones, smartwatches, etc. This trend has enhanced the lifestyle of the users of these devices, and it provides new services and applications to them. The fast growth of IOT has resulted in inclusion and connection of these devices a predominant procedure. Though there are many advantages due to usage of IoT devices, there are different challenges as well due to its usage. Among the many existing challenges, Distributed Denial of Service(DDoS) attack is a relatively simple but very powerful technique to attack intranet and Internet resources. Usually, in this attack, the legitimate users are deprived of using web-based services by many compromised machines. DDoS attacks can be implemented in network, transport and application layers using different protocols, such as TCP, UDP, ICMP and HTTP. The CIC-DDoS2019 dataset consists of 11 different DDoS attacks and benign traffic with 88 features. In this report, data for six DDoS attacks and benign data has been used. Info Gain Attribute Evaluator was used to extract the twenty-four most important features. The Machine Learning (ML) algorithms studied are Bayesian Network (BayesNet) , K-Nearest Neighbors (KNN) , J48. The experiments have been performed using the Waikato Environment for Knowledge Analysis (WEKA) tool with five-fold validation. Accuracy, Precision, Recall, F-measure, and execution time have been used as the performance metrics. From the results obtained, J48 performed better among all the algorithms in terms of accuracy, precision, recall and F-measure.en_US
dc.description.scholarlevelGraduateen_US
dc.identifier.urihttp://hdl.handle.net/1828/15046
dc.language.isoenen_US
dc.rightsAvailable to the World Wide Weben_US
dc.titleDDoS Attacks Detection using Machine Learningen_US
dc.typeprojecten_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Sabir_Mohammed_MEng_2023.pdf
Size:
1.42 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2 KB
Format:
Item-specific license agreed upon to submission
Description: