A Prevalent Model-based on Machine Learning for Identifying DRDoS Attacks through Features Optimization Technique
Keywords:
DRDoS Attack, Attack Analysis, Cyber Security Attack, Machine Learning, NetBIOS
Abstract
Growing apprehension among internet users regarding cyber-security threats, particularly Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue. Despite considerable research endeavors, the efficacy of detecting DRDoS attacks remains unsatisfactory. This deficiency calls for the development of pioneering solutions to enhance detection capabilities and fortify cyber defenses against this sophisticated subtype of Distributed Denial of Service (DDoS) attacks. This study addresses this challenge by utilizing four distinct machine learning algorithms: SVM, DT, RF, and LR, supplemented by PCA. Leveraging the CIC Bell DNS 2021 dataset, our experiments produce compelling results. Specifically, both DT and RF algorithms exhibit exceptional performance with 100% accuracy and perfect F1 scores. This remarkable performance holds true with or without PCA-based feature reduction, except for dataset 4. Consequently, our research highlights the potential of machine learning in detecting and mitigating DRDoS attacks, offering valuable insights for bolstering cybersecurity measures against evolving threats.
Published
2024-08-25
How to Cite
Pabon Shaha, Md. Saikat Islam Khan, Rahman, A., Mohammad Minoar Hossain, Golam Mahamood Mammun, & Mostofa Kamal Nasir. (2024). A Prevalent Model-based on Machine Learning for Identifying DRDoS Attacks through Features Optimization Technique. Statistics, Optimization & Information Computing, 13(1), 409-433. https://doi.org/10.19139/soic-2310-5070-2042
Issue
Section
Research Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).