Detecting TCP Flood DDoS Attack by Anomaly Detection based on Machine Learning Algorithms

Berkay Özçam, H. Hakan Kilinc, Abdàl Halim Zaim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)

Abstract

The comfort area created by the fact that people can access everything via the internet has led to an increase in the rate of internet use in recent years. The rise of concepts such as 5G, Internet of Things(IoT), Cloud/Edge/Fog Computing shows that this usage will increase day by day. While this increase brings convenience to humanity, it also increases the appetite of malicious people. Cyber attacks are increasing day by day and many individual or corporate users are harmed. In this study, it is aimed to detect Distributed Denial of Service(DDoS) attacks, which are the most common and most harmful of the bullying we mentioned. We focused on detecting TCP-Flood attacks, which is one of the most preferred DDoS attack types, using various machine learning algorithms. The part that made this job difficult and different was the targeting of real-time detection.

Original languageEnglish
Title of host publicationProceedings - 6th International Conference on Computer Science and Engineering, UBMK 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages512-516
Number of pages5
ISBN (Electronic)9781665429085
DOIs
Publication statusPublished - 2021
Externally publishedYes
Event6th International Conference on Computer Science and Engineering, UBMK 2021 - Ankara, Turkey
Duration: 15 Sept 202117 Sept 2021

Publication series

NameProceedings - 6th International Conference on Computer Science and Engineering, UBMK 2021

Conference

Conference6th International Conference on Computer Science and Engineering, UBMK 2021
Country/TerritoryTurkey
CityAnkara
Period15/09/2117/09/21

Bibliographical note

Publisher Copyright:
© 2021 IEEE

Keywords

  • Anomaly Detection
  • Classification
  • Clustering
  • DDoS
  • Machine Learning
  • TCP-SYN Flood

Fingerprint

Dive into the research topics of 'Detecting TCP Flood DDoS Attack by Anomaly Detection based on Machine Learning Algorithms'. Together they form a unique fingerprint.

Cite this