Event Details
DDoS Attacks Detection using Machine Learning
Presenter: Mohammed Younus Sabir
Supervisor:
Date: Thu, February 23, 2023
Time: 08:00:00 - 09:00:00
Place: via Zoom - please see link below
ABSTRACT
Join Zoom Meeting
Meeting ID: 952 778 2034
Password: 745607
One tap mobile
+16475580588,,9527782034# Canada
+17789072071,,9527782034# Canada
Dial by your location
+1 647 558 0588 Canada
+1 778 907 2071 Canada
Meeting ID: 952 778 2034
Find your local number:
ABSTRACT
The advancement in information technology has created a new era named as Internet of Things (IoT). This new technology has allowed things to be connected to the Internet, for example smart TVs, printers, cameras, smartphones, smartwatches, etc. This trend has enhanced the lifestyle of the users of these devices, and it provides new services and applications to them. The fast growth of IOT has resulted in inclusion and connection of these devices a predominant procedure. Though there are many advantages due to usage of IoT devices, there are different challenges as well due to its usage. Among the many existing challenges, Distributed Denial of Service(DDoS) attack is a relatively simple but very powerful technique to attack intranet and Internet resources. Usually, in this attack, the legitimate users are deprived of using web-based services by many compromised machines. DDoS attacks can be implemented in network, transport and application layers using different protocols, such as TCP, UDP, ICMP and HTTP. The CSE-CICDDoS2019 dataset consists of 11 different DDoS attacks and benign traffic with 88 features. In this project, data for six DDoS attacks and benign data has been used. Info Gain Attribute Evaluator was used to extract the twenty-four most important features. The Machine Learning (ML) algorithms studied are Bayesian Network (BayesNet) , K-Nearest Neighbors (KNN) , J48. The experiments have been performed using the Waikato Environment for Knowledge Analysis (WEKA) tool with five-fold validation. Accuracy, Precision, Recall, F-measure, and execution time have been used as the performance metrics. From the results obtained, J48 performed better among all the algorithms in terms of accuracy, precision, recall and F-measure.