DDoS Detection Using Active and Idle Features of Revised CICFlowMeter and Statistical Approaches

Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down targeted victim. CICFlowMeter tool generates bi-directional flows from packets. Eac...

Full description

Bibliographic Details
Published in:ICOASE 2022 - 4th International Conference on Advanced Science and Engineering
Main Author: Ali B.H.; Sulaiman N.; Al-Haddad S.A.R.; Atan R.; Hassan S.L.M.
Format: Conference paper
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2022
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85152196915&doi=10.1109%2fICOASE56293.2022.10075591&partnerID=40&md5=6399a149355b3eda6fed45f3e2c99315
Description
Summary:Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down targeted victim. CICFlowMeter tool generates bi-directional flows from packets. Each flow generates 83 of different features. The research focuses on 8 features which are active min (f1), active mean (f2), active max (f3), active std (f4), idle min (f5), idle mean (f6), idle max (f7), and idle std (f8). CICFlowMeter tool has several problems that affected on the detection accuracy of DDoS attacks. The idle and active based feature of Shannon entropy and sequential probability ratio test (SE-SPRT) approach was implemented in this research. The problems of original CICFlowMeter were presented, and the differences between original and revised version of CICFlowMeter tool were explored. The DARPA database and confusion matrix were used to evaluate the detection technique and present the comparison between two versions of CICFlowMeter. The detection method detected neptune and smurf attacks and had higher accuracy, f1-score, sensitivity, specificity, and precision when revised version of CICFlowMeter used to generate flows. However, the detection method failed to detect neptune attack and had higher miss-rate, lower accuracy, lower f1-score, and lower specificity, and lower precision when original version used in generating flows. © 2022 IEEE.
ISSN:
DOI:10.1109/ICOASE56293.2022.10075591