Event Details

DDoS Attacks Detection using Machine Learning

Presenter: Mohammed Younus Sabir
Supervisor:

Date: Thu, February 23, 2023
Time: 08:00:00 - 09:00:00
Place: via Zoom - please see link below

ABSTRACT

Join Zoom Meeting

https://uvic.zoom.us/j/9527782034?pwd=cVVXSlBiYXpvbDRTeXlWNENVLzVTUT09

Meeting ID: 952 778 2034

Password: 745607

One tap mobile

+16475580588,,9527782034# Canada

+17789072071,,9527782034# Canada

Dial by your location

        +1 647 558 0588 Canada

        +1 778 907 2071 Canada

Meeting ID: 952 778 2034

Find your local number: https://uvic.zoom.us/u/kcuYrchssn
 

ABSTRACT

The advancement in information technology has created a new era named as Internet of Things (IoT). This new technology has allowed things to be connected to the Internet, for example smart TVs, printers, cameras, smartphones, smartwatches, etc. This trend has enhanced the lifestyle of the users of these devices, and it provides new services and applications to them. The fast growth of IOT has resulted in inclusion and connection of these devices a predominant procedure. Though there are many advantages due to usage of IoT devices, there are different challenges as well due to its usage. Among the many existing challenges, Distributed Denial of Service(DDoS) attack is a relatively simple but very powerful technique to attack intranet and Internet resources. Usually, in this attack, the legitimate users are deprived of using web-based services by many compromised machines. DDoS attacks can be implemented in network, transport and application layers using different protocols, such as TCP, UDP, ICMP and HTTP.  The CSE-CICDDoS2019 dataset consists of 11 different DDoS attacks and benign traffic with 88 features. In this project, data for six DDoS attacks and benign data has been used. Info Gain Attribute Evaluator was used to extract the twenty-four most important features. The Machine Learning (ML) algorithms studied are Bayesian Network (BayesNet) , K-Nearest Neighbors (KNN) , J48. The experiments have been performed using the Waikato Environment for Knowledge Analysis (WEKA) tool with five-fold validation. Accuracy, Precision, Recall, F-measure, and execution time have been used as the performance metrics. From the results obtained, J48 performed better among all the algorithms in terms of accuracy, precision, recall and F-measure.