learning techniques, including ensemble approaches,
could increase detection accuracy and decrease false
positives. All of these enhancements would
contribute to the development of more resilient and
adaptable systems that can protect networks from
more attackers (Saied, R. E. et.al., 2016).
8 CONCLUSIONS
The project's main goal is to identify Distributed
Denial of Service (DDoS) assaults, which take
advantage of server weaknesses by flooding them
with connections at once, causing server overload and
response time issues. Utilizing technologies like
Mininet in a virtual machine environment and the
Ryu controller, a framework with a focus on attack
detection, the implementation was done on the
Ubuntu operating system. This project presents the
Cat-Boost method, which categorizes data by
assigning values that belong to the same class, in
contrast to the current system that uses the Random
Forest algorithm based on decision trees. This paper
offers a fresh technique to DDoS assault detection by
substituting the CatBoost algorithm for the
conventional Random Forest methodology (N. Zhang
et.al.,
2019). It is built with Mininet and the Ryu
controller, which serves as an attack detection
framework, in a virtualized Ubuntu environment.
CatBoost improves detection accuracy over the
traditional method by efficiently applying gradient
boosting to decision trees for data categorization.
This technique strengthens the network's security and
resilience by enhancing the system's ability to
distinguish between malicious and legal traffic (3. N.
M. Saravana Kumar, et.al. 2016) The findings show
that the suggested approach offers a more dependable
and efficient way to guard against DDoS assaults,
guarantee peak network performance, and lower the
frequency of reaction time mistakes. Further
optimization and practical implementation in future
studies to enhance scalability and flexibility. The
Figure 3 & 4 shows the output of the project where it
has a process to identify the IP Address of every users
who are requesting to the website and using this
system we can identify the legal and illegal requests
and its IP Address. And we can give the response to
the legal requesting users.
REFERENCES
A. Saied, R. E. Overill, and T. Radzik, "Detection of known
and unknown DDoS attacks using artificial neural
networks," Neurocomputing, vol. 172, pp. 385–393,
Jan. 2016.
E. Adi, Z. Baig, C. P. Lam, and P. Hingston, "Low-rate
denial-of-service attacks against HTTP/2 services," in
Proc. 5th Int. Conf. IT Convergence Security (ICITCS),
Aug. 2015.
H. Kumawat and G. Meena, "Characterization, detection
and mitigation of low-rate DoS attack," in Proc. Int.
Conf. Inf. Commun. Technol. Competitive Strategies,
2014.
H. S. Abdulkarem and A. Drawod, "DDoS attack detection
and mitigation at SDN data plane layer," in Proc. 2nd
Global Power, Energy and Communication Conf.
(GPECOM), Oct. 2020, pp. 322–326.
J. Ye, X. Cheng, and J. Zhu, "A DDoS attack detection
method based on SVM in software-defined network,"
Secur. Commun. Netw., vol. 2018, Apr. 2018, Art. no.
9804061.
J. Cui, M. Wang, and Y. Luo, "DDoS detection and defense
mechanism based on cognitive-inspired computing in
SDN," Future Gener. Comput. Syst., vol. 97, pp. 275–
283, Aug. 2019.
K. G. Maheswari, C. Siva, and G. Nalinipriya, "Optimal
cluster-based feature selection for intrusion detection
system in web and cloud computing environment using
hybrid teacher learning optimization enables deep
recurrent neural network," 2023.
K. G. Maheswari, C. Siva, and G. N. Priya, "An optimal
cluster-based intrusion detection system for defense
against attack in web and cloud computing
environments," 2023.
M. Baskar, T. Gnanasekaran, and S. Saravanan, "Adaptive
IP traceback mechanism for detecting low-rate DDoS
attacks," in Proc. IEEE Int. Conf. Emerg. Trends
Comput., Commun. Nanotechnol. (ICECCN), Mar.
2013.
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita,
"Network anomaly detection: Methods, systems and
tools," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp.
303–336, 1st Quart. 2014.
M. H. Bhuyan and E. Elmroth, "Multi-scale low-rate DDoS
attack detection using the generalized total variation
metric," in Proc. 17th IEEE Int. Conf. Mach. Learn.
Appl. (ICMLA), Dec. 2018.
N. M. Saravana Kumar, S. Deepa, C. N. Marimuthu, T.
Eswari, and S. Lavanya, "Signature-based vulnerability
detection over wireless sensor network for reliable data
transmission," 2016.
N. Zhang, F. Jaafar, and Y. Malik, "Low-rate DoS attack
detection using PSD based entropy and machine
learning," in Proc. 6th IEEE Int. Conf. Cyber Security
and Cloud Comput., Jun. 2019.
N. Agrawal and S. Tapaswi, "Defense mechanisms against
DDoS attacks in a cloud computing environment: State-
of-the-art and research challenges," IEEE Commun.
Surveys Tuts., vol. 21, no. 4, pp. 3769–3795, Oct. 2019.
O. Osanaiye, K.-K. R. Choo, and M. Dlodlo, "Distributed
denial of service (DDoS) resilience in cloud: Review
and conceptual cloud DDoS mitigation framework," J.
Netw. Comput. Appl., vol. 67, pp. 147–165, May 2016.