Attack based DoS attack detection using multiple classifier

by   Mohamed Abushwereb, et al.

One of the most common internet attacks causing significant economic losses in recent years is the Denial of Service (DoS) flooding attack. As a countermeasure, intrusion detection systems equipped with machine learning classification algorithms were developed to detect anomalies in network traffic. These classification algorithms had varying degrees of success, depending on the type of DoS attack used. In this paper, we use an SNMP-MIB dataset from real testbed to explore the most prominent DoS attacks and the chances of their detection based on the classification algorithm used. The results show that most DOS attacks used nowadays can be detected with high accuracy using machine learning classification techniques based on features provided by SNMP-MIB. We also conclude that of all the attacks we studied, the Slowloris attack had the highest detection rate, on the other hand TCP-SYN had the lowest detection rate throughout all classification techniques, despite being one of the most used DoS attacks.


page 5

page 6


Performance Evaluation of Machine Learning Techniques for DoS Detection in Wireless Sensor Network

The nature of Wireless Sensor Networks (WSN) and the widespread of using...

Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection

Ransomware has become a significant global threat with the ransomware-as...

Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis)

Phishing attacks are the most common type of cyber-attacks used to obtai...

Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification

Advanced Persistent Threat (APT) attack, also known as directed threat a...

Ransomware Detection using Process Memory

Ransomware attacks have increased significantly in recent years, causing...

A Wireless Intrusion Detection System for 802.11 WPA3 Networks

Wi-Fi (802.11) networks have become an essential part of our daily lives...

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

In this paper, we present a study that proposes a three-stage classifier...