Skip to main content

Uses of Artificial Intelligence in Cyber Security to Mitigate DDOS

  • Conference paper
  • First Online:
Proceedings of the Future Technologies Conference (FTC) 2023, Volume 2 (FTC 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 814))

Included in the following conference series:

  • 209 Accesses

Abstract

The Distributed Denial of Service (DDoS) attacks have a negative impact on service availability and service providers, as well as on the economy. They lead to difficulty in the provision of online services because most or all the service providers use resources, and the bandwidth becomes completely depleted due to the lack of resources to perform the basic functions required in service delivery platforms. Because this kind of attack is unconventional, the detection process demands more complex methods and algorithms. Based on several algorithms such as Decision Tree, Naïve Bayes, K-Nearest Neighbors, and Support Vector Machine algorithms, in this study we supplied an ideal model for the detection of the attack. We used a training dataset that had been built from the known and suspicious traffic dataset for learning using different classification algorithms to make a prediction model to be utilized as a reference for the unknown traffic classification. To make sure we choose the best prediction model, we performed a validation for the prediction model by applying the prediction model to a test dataset, generating a confusion matrix, and utilizing it to obtain the maximum prediction probability and minimum false alarm rate. By using the prediction model, we can detect the attack traffic, get the necessary data about attacking botnet and forward this information to a firewall to block suspicious traffic and stop the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Conflicts of Interest

The authors declare that they have no conflicts of interest to report regarding the present study.

References

  1. Umar, R., Olalere, M., Idris, I., Egigogo, R.A., Bolarin, G.: Performance evaluation of ML for hypertext transfer protocol distributed denial of service intrusion detection. In: 15th International Conference on Electronics, Computer and Computation, Abuja, Nigeria, pp. 1–7 (2019)

    Google Scholar 

  2. Roempluk, T., Surintaused, O.: A machine learning approach for detecting distributed denial of service attacks. In: Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering, Nan, Thailand, pp. 146–149 (2019)

    Google Scholar 

  3. Ali, O., Cotaeempluk, P.: Towards DoS/DDoS attack detection using artificial neural networks. In: Electronics & Mobile Communication Conference, New York City, Ny, USA, pp. 229–234 (2018)

    Google Scholar 

  4. Khonde, S.R., Venugopal, U.: Hybrid architecture for distributed intrusion detection system. Int. Inf. Eng. Technol. Assoc. 24(1), 19–28 (2019)

    Google Scholar 

  5. Kachavimath, V., Nazare, S.V., Akkiresearchers, S.S.: Distributed denial of service attack detection using naïve bayes and k-nearest neighbor for network forensics. In: 2nd International Conference on Innovative Mechanisms for Industry Applications, Bangalore, India, pp. 711–717 (2020)

    Google Scholar 

  6. Idhammad, M., Afdel, K., Belouch, M.: Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest. Secur. Commun. Netw. 2018, 1–13 (2018)

    Article  Google Scholar 

  7. Huseyin, P., Onur, P., Aydin, C.: Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models. Sustainability 12(3), 1–16 (2020)

    Google Scholar 

  8. Hoang, X.D., Nguyen, Q.C.: Botnet detection based on machine learning techniques using DNS query data. Future Internet 10(5), 43 (2018)

    Article  Google Scholar 

  9. Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest. Secur. Commun. Netw. 2018(1), 1–9 (2018)

    Article  Google Scholar 

Download references

Acknowledgment

“The authors extend their appreciation to the Deanship of Scientific Research at Saudi Electronic University for logistic support of this work through the 2nd Interdisciplinary Scientific Research Hackathon, project no. (SRH001T2).”

Funding

The authors received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raniyah Wazirali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Althagafi, S.S., Aljudiaibi, H.F., Alharbi, B.A., Wazirali, R. (2023). Uses of Artificial Intelligence in Cyber Security to Mitigate DDOS. In: Arai, K. (eds) Proceedings of the Future Technologies Conference (FTC) 2023, Volume 2. FTC 2023. Lecture Notes in Networks and Systems, vol 814. Springer, Cham. https://doi.org/10.1007/978-3-031-47451-4_39

Download citation

Publish with us

Policies and ethics