A Hybrid Approach for Efficient DDoS Detection in Network Traffic Using CBLOF-Based Feature Engineering and XGBoost
DOI:
https://doi.org/10.62411/faith.2024-33Keywords:
Clustering-Based Local Outlier (CBLOF), DDoS attacks, Extreme Gradient Boosting (XGBoost), Intrusion Detection, Network securityAbstract
This is one of the greatest challenges in computer network security and cannot be dealt with without a set of most recent detection techniques. This paper lays down a new hybrid technique that combines Clustering-Based Local Outlier Factor (CBLOF) and Extreme Gradient Boosting (XGBoost) to enhance accuracy while detecting Distributed Denial of Service (DDoS) from network traffic. The proposed hybrid model utilizes a CBLOF for outlier detection as feature engineering. Over the detected anomalies, classification is to be done using XGBoost classification to attain the objective. The proposed hybrid model was tested extensively on CICIDS 2017 and CICIDS 2018 datasets Compared with traditional ones, the proposed model outperformed the traditional ones with an accuracy rate of 99.99%, precision of 100%, and F1 score reflecting perfection. These results confirm this model's efficiency in terms of known and novel attack patterns and introduce a further reliable framework for the timely detection of DDoS attacks. Even if it is computation-heavy, optimization could be made towards real-time large-scale data.
Downloads
References
P. Kumari and A. K. Jain, “A comprehensive study of DDoS attacks over IoT network and their countermeasures,” Comput. Secur., vol. 127, p. 103096, Apr. 2023, doi: 10.1016/j.cose.2023.103096.
M. H. Ali et al., “Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT),” Electronics, vol. 11, no. 3, p. 494, Feb. 2022, doi: 10.3390/electronics11030494.
Z. Liu, Y. Wang, F. Feng, Y. Liu, Z. Li, and Y. Shan, “A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks,” Sensors, vol. 23, no. 13, p. 6176, Jul. 2023, doi: 10.3390/s23136176.
A. Golduzian, “Predict And Prevent DDOS Attacks Using Machine Learning and Statistical Algorithms,” arXiv. 2023. doi: 10.48550/arXiv.2308.15674.
D. R. I. M. Setiadi, S. Widiono, A. N. Safriandono, and S. Budi, “Phishing Website Detection Using Bidirectional Gated Recurrent Unit Model and Feature Selection,” J. Futur. Artif. Intell. Technol., vol. 2, no. 1, pp. 75–83, 2024, doi: 10.62411/faith.2024-15.
M. A. Talukder et al., “A dependable hybrid machine learning model for network intrusion detection,” J. Inf. Secur. Appl., vol. 72, p. 103405, Feb. 2023, doi: 10.1016/j.jisa.2022.103405.
H. Karthikeyan and G. Usha, “Real-time DDoS flooding attack detection in intelligent transportation systems,” Comput. Electr. Eng., vol. 101, p. 107995, Jul. 2022, doi: 10.1016/j.compeleceng.2022.107995.
R. Abubakar et al., “An Effective Mechanism to Mitigate Real-Time DDoS Attack,” IEEE Access, vol. 8, pp. 126215–126227, 2020, doi: 10.1109/ACCESS.2020.2995820.
M. Snehi and A. Bhandari, “Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks,” Comput. Sci. Rev., vol. 40, p. 100371, May 2021, doi: 10.1016/j.cosrev.2021.100371.
S. J., “Assessing DDoS Detection Accuracy through Semi-Supervised Techniques,” Indian Sci. J. Res. Eng. Manag., vol. 08, no. 03, pp. 1–5, Mar. 2024, doi: 10.55041/IJSREM29861.
A. Srivastava, S. Tiwari, D. Kumar, and N. Garg, “Finding of DDoS Attack in IoT-Based Networks Using Ensemble Technique,” in 2024 International Conference on Intelligent Systems for Cybersecurity (ISCS), May 2024, pp. 1–4. doi: 10.1109/ISCS61804.2024.10581044.
F. L. Becerra-Suarez, I. Fernández-Roman, and M. G. Forero, “Improvement of Distributed Denial of Service Attack Detection through Machine Learning and Data Processing,” Mathematics, vol. 12, no. 9, p. 1294, Apr. 2024, doi: 10.3390/math12091294.
J. Deng, L. Cheng, H. Yuan, K. Zheng, X. Li, and Q. Li, “An Online Detection System for LDoS attack Based on XGBoost,” in 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), Dec. 2023, pp. 1083–1088. doi: 10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00174.
S. Ullah et al., “TNN-IDS: Transformer neural network-based intrusion detection system for MQTT-enabled IoT Networks,” Comput. Networks, vol. 237, p. 110072, Dec. 2023, doi: 10.1016/j.comnet.2023.110072.
W. Xu and Y. Fan, “Intrusion Detection Systems Based on Logarithmic Autoencoder and XGBoost,” Secur. Commun. Networks, vol. 2022, pp. 1–8, Apr. 2022, doi: 10.1155/2022/9068724.
S. Dhaliwal, A.-A. Nahid, and R. Abbas, “Effective Intrusion Detection System Using XGBoost,” Information, vol. 9, no. 7, p. 149, Nov. 2018, doi: 10.3390/info9070149.
D. M. Sindika, M. R. Nicholaus, and N. B. Hamadi, “Improving Network Security: An Intrusion Detection System (IDS) Dataset from Higher Learning Institutions, Mbeya University of Science and Technology (MUST), Tanzania,” East African J. Inf. Technol., vol. 7, no. 1, pp. 23–38, Jan. 2024, doi: 10.37284/eajit.7.1.1679.
T.-T.-H. Le, Y. E. Oktian, and H. Kim, “XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems,” Sustainability, vol. 14, no. 14, p. 8707, Jul. 2022, doi: 10.3390/su14148707.
R. Devarajan and P. Rao, “An Efficient Intrusion Detection System by Using Behaviour Profiling and Statistical Approach Model,” Int. Arab J. Inf. Technol., vol. 18, no. 1, pp. 114–124, Dec. 2020, doi: 10.34028/iajit/18/1/13.
P. TS and P. Shrinivasacharya, “Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security,” Glob. Transitions Proc., vol. 2, no. 2, pp. 448–454, Nov. 2021, doi: 10.1016/j.gltp.2021.08.017.
M. Ozkan-Okay, R. Samet, O. Aslan, and D. Gupta, “A Comprehensive Systematic Literature Review on Intrusion Detection Systems,” IEEE Access, vol. 9, pp. 157727–157760, 2021, doi: 10.1109/ACCESS.2021.3129336.
M. R. Ayyagari, N. Kesswani, M. Kumar, and K. Kumar, “Intrusion detection techniques in network environment: a systematic review,” Wirel. Networks, vol. 27, no. 2, pp. 1269–1285, Feb. 2021, doi: 10.1007/s11276-020-02529-3.
L. Zheng, L. Chen, and Y. Wang, “A new unsupervised outlier detection method,” J. Intell. Fuzzy Syst., vol. 46, no. 1, pp. 1713–1734, Jan. 2024, doi: 10.3233/JIFS-236518.
C. N. Obiora, A. N. Hasan, and A. Ali, “Predicting Solar Irradiance at Several Time Horizons Using Machine Learning Algorithms,” Sustainability, vol. 15, no. 11, p. 8927, Jun. 2023, doi: 10.3390/su15118927.
Canadian Institute for Cybersecurity, “Intrusion detection evaluation dataset (CIC-IDS2017),” Canadian Institute for Cybersecurity. https://www.unb.ca/cic/datasets/ids-2017.html
Communications Security Establishment (CSE) and Canadian Institute for Cybersecurity (CIC), “CSE-CIC-IDS2018 on AWS,” Canadian Institute for Cybersecurity. https://www.unb.ca/cic/datasets/ids-2018.html
I. Sharafaldin, A. Habibi Lashkari, and A. A. Ghorbani, “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization,” in Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, pp. 108–116. doi: 10.5220/0006639801080116.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Journal of Future Artificial Intelligence and Technologies
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.