SlideShare a Scribd company logo
SKY SHIELD: A SKETCH-BASED
DEFENSE SYSTEM AGAINST
APPLICATION LAYER DDOS ATTACKS
Batch Members:
SHRISENA M(722821205047)
SRIHARAN K(722821205048)
KAVIN K(722821205019)
KIRUTHICK SARAN D(722821205020)
Guided by,
Mr.G.Swaminathan,
Assistant Professor,
Sri Eshwar College of
Engineering
Sri Eshwar College of Engineering
(Autonomous) Coimbatore -
641202.
Department of Information Technology
Third Review [PHASE-I]
Abstract
• The Internet is vulnerable to bandwidth distributed denial-of-service (BW- DDoS) attacks, wherein many hosts
send a huge number of packets to cause congestion and disrupt legitimate traffic.
• when adding a defense component against adversarial attacks, it is important to deploy multiple defense methods in
tandem to achieve a good coverage of various attacks, BW- DDoS attacks have employed relatively crude,
inefficient, brute-force mechanisms; future attacks might be significantly more effective and harmful.
• To meet the increasing threats, more advanced defenses are necessary. Distributed denial of service (DDoS) and
adversial attacks pose a serious threat to the Internet.
• We discuss the Internet's vulnerability to Bandwidth Distributed Denial of Service (BW-DDoS) attacks, where
many hosts send a huge number of packets exceeding network capacity and causing congestion and losses, thereby
disrupting legitimate traffic.
Dept of IT 2
Introduction
Dept of IT 3
• Distributed Denial of Service(DDOS) Attacks pose a serious threat to the internet.
• We discuss the Internet's Vulnerability to Bandwidth Distributed Denial of Service(BWDDOS) Attacks, where many
hosts send a huge number of packets exceeding network capacity and causing congestion and losses, thereby
disrupting legitimate traffic.
• TCP and other protocols employ congestion control mechanism that response to losses and delays by reducing
network usage, hence their performance may be degraded sharply due to such attacks.
• Attackers may disrupt connectivity to servers, networks, autonomous systems, or whole countries or regions; such
attacks were already launched in several conflicts.
• BWDDOS employed relatively crude, inefficient, 'brute force' mechanism; future attacks may be significantly more
effective, and hence much more harmful.
Literature Survey
Title of The paper Description Publication details
DDOs attack detection with
feature engineering and machine
learning: the framework and
performance evaluvation
A strategic framework is proposed that ensures
effective DDoS detection with significant feature
reduction (up to 68%) and minimal accuracy loss
(~0.03%). K-nearest neighbors (KNN) shows the best
overall performance, with models validated through
cross-validation and AUC analyses.
Spingers,2019
Statistical Application
Fingerprinting for
DDoS Attack Mitigation
The framework is extended to detect distributed
denial of service (DDoS) attacks, achieving an
accuracy of over 97% with a misclassification rate of
just 2.5%, as demonstrated using five real-world
traffic datasets.
IEEE,2019
Dept of IT 4
Literature Survey
Title of The paper Description Publication details
Learning Multilevel Auto-
Encoders for DDoS
Attack Detection in Smart Grid
Network
The final detection model, created by combining
multilevel features with a multiple kernel learning
(MKL) algorithm, is evaluated on two benchmark
DDoS attack databases. The proposed method
outperforms six recent techniques in prediction
accuracy.
IEEE,2019
DDoS Detection System:
Using a Set of
Classification Algorithms
Controlled by Fuzzy
Logic System in Apache
Spark
DDoS Detection System: Using a Set of Classification
Algorithms Controlled by Fuzzy Logic System in
Apache Spark
IEEE,2019
Dept of IT 5
Existing System
• Existing DDoS detection methods primarily focus on identifying specific types of attacks, often failing to detect
other types or mixed DDoS attacks.
• The system introduces five new features derived from heterogeneous packets: entropy rate of IP source flow,
entropy rate of flow, entropy of packet size, entropy rate of packet size, and the number of ICMP destination
unreachable packets.
• The proposed features enable the detection of various types of DDoS attacks, including complex and mixed
attacks, which are often missed by traditional methods.
• The system shows significant improvements in detection accuracy, outperforming existing methods by 21% to
53%.
• The system is based on a comprehensive analysis of the characteristics of various DDoS attacks, leading to more
effective and versatile detection.
Dept of IT 7
Proposed System
• BWDDOS attacks, where the attacker sends as many packets as possible directly to the victim, or from an
attacker controlled machines called 'zombies' or ‘puppets’.
• The simplest scenario is one in which the attacker is sending multiple packets using a connection less protocol
such as UDP.
• In Puppet attacks, zombie attacks, root attacks the attacker commonly has a user mode executable on the
zombie machine which opens a standard UDP sockets and sends many packets towards the victim.
• The first attempts to avoid detection, and the second tries to exploit legitimate protocol behavior and cause
legitimate clients/server to excessively misuse their bandwidth against the attacked victim.
Dept of IT 8
Methodology
• The methodology of "Sky Shield: A Sketch-Based Defense System Against Application Layer DDoS Attacks"
revolves around efficiently detecting and mitigating application-layer Distributed Denial of Service (DDoS)
attacks.
• The defense system is tested through simulations to evaluate its accuracy, memory usage, and scalability,
ensuring robust protection against application-layer DDoS attacks.
• The system first collects network traffic, focusing on application-layer requests like HTTP, and extracts key
traffic features such as request rates and user patterns.
▪ Sky Shield then applies countermeasures like blacklisting suspicious IP addresses, rate-limiting users, or
implementing graceful degradation of services during high attack periods.
Dept of IT 8
Project Modules
Sketch-Based Data Structure Module:
• Implements a memory-efficient data structure, such as Count-Min Sketch, for storing and updating traffic
profiles.
• It continuously updates the sketch as new requests are processed, helping detect traffic anomalies with
minimal memory overhead.
Mitigation Module:
• Once an attack is identified, this module takes action to mitigate the threat.
• It may involve blacklisting or rate-limiting suspicious IP addresses, adjusting traffic priorities, or slowing
down responses to suspected malicious users.
Dept of IT 9
System Requirements
HARDWARE REQUIREMENTS
CPU type : Intel core i5 processor
Clock speed : 3.0 GHz
RAM size : 8 GB
Hard disk capacity : 500 GB
Keyboard type : Internet Keyboard
CD -drive type : 52xmax
SOFTWARE REQUIREMENTS
Operating System : Windows 10
Front End : JAVA
Dept of IT 10
Use Case Diagram
Conference/Journal Publication Status
▪ Aamir, M., Zaidi, S.M.A.: DDoS attack detection with feature engineering and machine learning: the framework
and performance evaluation. Int. J. Inf. Security 18(6), 761–785 (2019)
▪ Ahmed, M.E., Ullah, S., Kim, H.: Statistical application fngerprinting for DDoS attack mitigation. IEEE Trans. Inf.
Forensics Security 14(6), 1471–1484 (2019)
▪ Ali, S., Li, Y.: Learning multilevel auto-encoders for DDoS attack detection in smart grid network. IEEE Access 7,
108647–108659 (2019)
▪ Alsirhani, A., Sampalli, S., Bodorik, P.: DDoS detection system: Using a set of classifcation algorithms controlled by
fuzzy logic system in apache spark. IEEE Trans. Netw. Service Manag. 16(3), 936–949 (2019)
Dept of IT 12
SAMPLE CODE
Dept of IT 14
SAMPLE CODE
Dept of IT 15
THANK YOU
Dept of IT 16

More Related Content

PDF
IRJET - DDOS Traffic Control using DSA Algorithm with Structure Informati...
IRJET Journal
 
PDF
Encountering distributed denial of service attack utilizing federated softwar...
IJECEIAES
 
DOC
Detection of application layer ddos attack using hidden semi markov model (20...
Mumbai Academisc
 
PDF
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
IRJET Journal
 
PDF
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
IJCI JOURNAL
 
PDF
RTL-DL: A HYBRID DEEP LEARNING FRAMEWORK FOR DDOS ATTACK DETECTION IN A BIG D...
IJCNCJournal
 
PDF
RTL-DL: A Hybrid Deep Learning Framework for DDoS Attack Detection in a Big D...
IJCNCJournal
 
PDF
An Innovative Hybrid Model for Effective DDOS Attack Detection in Software De...
ijcncjournal019
 
IRJET - DDOS Traffic Control using DSA Algorithm with Structure Informati...
IRJET Journal
 
Encountering distributed denial of service attack utilizing federated softwar...
IJECEIAES
 
Detection of application layer ddos attack using hidden semi markov model (20...
Mumbai Academisc
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
IRJET Journal
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
IJCI JOURNAL
 
RTL-DL: A HYBRID DEEP LEARNING FRAMEWORK FOR DDOS ATTACK DETECTION IN A BIG D...
IJCNCJournal
 
RTL-DL: A Hybrid Deep Learning Framework for DDoS Attack Detection in a Big D...
IJCNCJournal
 
An Innovative Hybrid Model for Effective DDOS Attack Detection in Software De...
ijcncjournal019
 

Similar to SKY SHIELD A SKETCH BASED DEFENSE SYSTEM AGAINST APPLICATION LAYER DDOS ATTACKS (2)[1].pptx (20)

PDF
An Innovative Hybrid Model for Effective DDOS Attack Detection in Software De...
IJCNCJournal
 
PDF
HYBRID DEEP LEARNING APPROACH FOR ENHANCED DETECTION AND MITIGATION OF DDOS A...
IJNSA Journal
 
PDF
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET Journal
 
PDF
An ensemble-based approach for effective distributed denial of service attack...
IAESIJAI
 
PPTX
Real time ddos attack , detection and prevention
KusalXIIBanipur
 
PDF
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
PDF
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
 
PDF
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET Journal
 
PDF
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
PDF
IMPROVING DDOS DETECTION IN IOT DEVICES
IRJET Journal
 
PDF
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
cscpconf
 
PDF
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
IJNSA Journal
 
PDF
DDoS Attack Detection and Botnet Prevention using Machine Learning
IRJET Journal
 
PDF
Evaluation of distributed denial of service attacks detection in software def...
IAESIJAI
 
PDF
Early Detection and Prevention of Distributed Denial Of Service Attack Using ...
IRJET Journal
 
PDF
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET Journal
 
PDF
Defense mechanism for ddos attack through machine learning
eSAT Journals
 
PDF
Defense mechanism for d do s attack through machine learning
eSAT Publishing House
 
PDF
1766 1770
Editor IJARCET
 
PDF
1766 1770
Editor IJARCET
 
An Innovative Hybrid Model for Effective DDOS Attack Detection in Software De...
IJCNCJournal
 
HYBRID DEEP LEARNING APPROACH FOR ENHANCED DETECTION AND MITIGATION OF DDOS A...
IJNSA Journal
 
IRJET- Sky Shield: A Sketch-Based Defense System against Application Laye...
IRJET Journal
 
An ensemble-based approach for effective distributed denial of service attack...
IAESIJAI
 
Real time ddos attack , detection and prevention
KusalXIIBanipur
 
Deep learning approach to DDoS attack with imbalanced data at the application...
TELKOMNIKA JOURNAL
 
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
 
IRJET- A Defense System Against Application Layer Ddos Attacks with Data Secu...
IRJET Journal
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IRJET Journal
 
IMPROVING DDOS DETECTION IN IOT DEVICES
IRJET Journal
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
cscpconf
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
IJNSA Journal
 
DDoS Attack Detection and Botnet Prevention using Machine Learning
IRJET Journal
 
Evaluation of distributed denial of service attacks detection in software def...
IAESIJAI
 
Early Detection and Prevention of Distributed Denial Of Service Attack Using ...
IRJET Journal
 
IRJET- Detection of Distributed Denial-of-Service (DDos) Attack on Software D...
IRJET Journal
 
Defense mechanism for ddos attack through machine learning
eSAT Journals
 
Defense mechanism for d do s attack through machine learning
eSAT Publishing House
 
1766 1770
Editor IJARCET
 
1766 1770
Editor IJARCET
 
Ad

More from ssuser55cbdb (8)

PPTX
1st_PPT_NLP_Innovative_project_dhanushkumar.pptx
ssuser55cbdb
 
PPTX
Indian AI Tech Project Proposal by Slidesgo.pptx
ssuser55cbdb
 
PPTX
Allocation methods (1).pptx
ssuser55cbdb
 
PDF
daa assignment 1.pdf
ssuser55cbdb
 
PPTX
Columnar Databases (1).pptx
ssuser55cbdb
 
PPTX
bfs and dfs (data structures).pptx
ssuser55cbdb
 
PPTX
block chain.pptx
ssuser55cbdb
 
PPT
8-Graph.ppt
ssuser55cbdb
 
1st_PPT_NLP_Innovative_project_dhanushkumar.pptx
ssuser55cbdb
 
Indian AI Tech Project Proposal by Slidesgo.pptx
ssuser55cbdb
 
Allocation methods (1).pptx
ssuser55cbdb
 
daa assignment 1.pdf
ssuser55cbdb
 
Columnar Databases (1).pptx
ssuser55cbdb
 
bfs and dfs (data structures).pptx
ssuser55cbdb
 
block chain.pptx
ssuser55cbdb
 
8-Graph.ppt
ssuser55cbdb
 
Ad

Recently uploaded (20)

PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Information Retrieval and Extraction - Module 7
premSankar19
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
Inventory management chapter in automation and robotics.
atisht0104
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 

SKY SHIELD A SKETCH BASED DEFENSE SYSTEM AGAINST APPLICATION LAYER DDOS ATTACKS (2)[1].pptx

  • 1. SKY SHIELD: A SKETCH-BASED DEFENSE SYSTEM AGAINST APPLICATION LAYER DDOS ATTACKS Batch Members: SHRISENA M(722821205047) SRIHARAN K(722821205048) KAVIN K(722821205019) KIRUTHICK SARAN D(722821205020) Guided by, Mr.G.Swaminathan, Assistant Professor, Sri Eshwar College of Engineering Sri Eshwar College of Engineering (Autonomous) Coimbatore - 641202. Department of Information Technology Third Review [PHASE-I]
  • 2. Abstract • The Internet is vulnerable to bandwidth distributed denial-of-service (BW- DDoS) attacks, wherein many hosts send a huge number of packets to cause congestion and disrupt legitimate traffic. • when adding a defense component against adversarial attacks, it is important to deploy multiple defense methods in tandem to achieve a good coverage of various attacks, BW- DDoS attacks have employed relatively crude, inefficient, brute-force mechanisms; future attacks might be significantly more effective and harmful. • To meet the increasing threats, more advanced defenses are necessary. Distributed denial of service (DDoS) and adversial attacks pose a serious threat to the Internet. • We discuss the Internet's vulnerability to Bandwidth Distributed Denial of Service (BW-DDoS) attacks, where many hosts send a huge number of packets exceeding network capacity and causing congestion and losses, thereby disrupting legitimate traffic. Dept of IT 2
  • 3. Introduction Dept of IT 3 • Distributed Denial of Service(DDOS) Attacks pose a serious threat to the internet. • We discuss the Internet's Vulnerability to Bandwidth Distributed Denial of Service(BWDDOS) Attacks, where many hosts send a huge number of packets exceeding network capacity and causing congestion and losses, thereby disrupting legitimate traffic. • TCP and other protocols employ congestion control mechanism that response to losses and delays by reducing network usage, hence their performance may be degraded sharply due to such attacks. • Attackers may disrupt connectivity to servers, networks, autonomous systems, or whole countries or regions; such attacks were already launched in several conflicts. • BWDDOS employed relatively crude, inefficient, 'brute force' mechanism; future attacks may be significantly more effective, and hence much more harmful.
  • 4. Literature Survey Title of The paper Description Publication details DDOs attack detection with feature engineering and machine learning: the framework and performance evaluvation A strategic framework is proposed that ensures effective DDoS detection with significant feature reduction (up to 68%) and minimal accuracy loss (~0.03%). K-nearest neighbors (KNN) shows the best overall performance, with models validated through cross-validation and AUC analyses. Spingers,2019 Statistical Application Fingerprinting for DDoS Attack Mitigation The framework is extended to detect distributed denial of service (DDoS) attacks, achieving an accuracy of over 97% with a misclassification rate of just 2.5%, as demonstrated using five real-world traffic datasets. IEEE,2019 Dept of IT 4
  • 5. Literature Survey Title of The paper Description Publication details Learning Multilevel Auto- Encoders for DDoS Attack Detection in Smart Grid Network The final detection model, created by combining multilevel features with a multiple kernel learning (MKL) algorithm, is evaluated on two benchmark DDoS attack databases. The proposed method outperforms six recent techniques in prediction accuracy. IEEE,2019 DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark IEEE,2019 Dept of IT 5
  • 6. Existing System • Existing DDoS detection methods primarily focus on identifying specific types of attacks, often failing to detect other types or mixed DDoS attacks. • The system introduces five new features derived from heterogeneous packets: entropy rate of IP source flow, entropy rate of flow, entropy of packet size, entropy rate of packet size, and the number of ICMP destination unreachable packets. • The proposed features enable the detection of various types of DDoS attacks, including complex and mixed attacks, which are often missed by traditional methods. • The system shows significant improvements in detection accuracy, outperforming existing methods by 21% to 53%. • The system is based on a comprehensive analysis of the characteristics of various DDoS attacks, leading to more effective and versatile detection. Dept of IT 7
  • 7. Proposed System • BWDDOS attacks, where the attacker sends as many packets as possible directly to the victim, or from an attacker controlled machines called 'zombies' or ‘puppets’. • The simplest scenario is one in which the attacker is sending multiple packets using a connection less protocol such as UDP. • In Puppet attacks, zombie attacks, root attacks the attacker commonly has a user mode executable on the zombie machine which opens a standard UDP sockets and sends many packets towards the victim. • The first attempts to avoid detection, and the second tries to exploit legitimate protocol behavior and cause legitimate clients/server to excessively misuse their bandwidth against the attacked victim. Dept of IT 8
  • 8. Methodology • The methodology of "Sky Shield: A Sketch-Based Defense System Against Application Layer DDoS Attacks" revolves around efficiently detecting and mitigating application-layer Distributed Denial of Service (DDoS) attacks. • The defense system is tested through simulations to evaluate its accuracy, memory usage, and scalability, ensuring robust protection against application-layer DDoS attacks. • The system first collects network traffic, focusing on application-layer requests like HTTP, and extracts key traffic features such as request rates and user patterns. ▪ Sky Shield then applies countermeasures like blacklisting suspicious IP addresses, rate-limiting users, or implementing graceful degradation of services during high attack periods. Dept of IT 8
  • 9. Project Modules Sketch-Based Data Structure Module: • Implements a memory-efficient data structure, such as Count-Min Sketch, for storing and updating traffic profiles. • It continuously updates the sketch as new requests are processed, helping detect traffic anomalies with minimal memory overhead. Mitigation Module: • Once an attack is identified, this module takes action to mitigate the threat. • It may involve blacklisting or rate-limiting suspicious IP addresses, adjusting traffic priorities, or slowing down responses to suspected malicious users. Dept of IT 9
  • 10. System Requirements HARDWARE REQUIREMENTS CPU type : Intel core i5 processor Clock speed : 3.0 GHz RAM size : 8 GB Hard disk capacity : 500 GB Keyboard type : Internet Keyboard CD -drive type : 52xmax SOFTWARE REQUIREMENTS Operating System : Windows 10 Front End : JAVA Dept of IT 10
  • 12. Conference/Journal Publication Status ▪ Aamir, M., Zaidi, S.M.A.: DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation. Int. J. Inf. Security 18(6), 761–785 (2019) ▪ Ahmed, M.E., Ullah, S., Kim, H.: Statistical application fngerprinting for DDoS attack mitigation. IEEE Trans. Inf. Forensics Security 14(6), 1471–1484 (2019) ▪ Ali, S., Li, Y.: Learning multilevel auto-encoders for DDoS attack detection in smart grid network. IEEE Access 7, 108647–108659 (2019) ▪ Alsirhani, A., Sampalli, S., Bodorik, P.: DDoS detection system: Using a set of classifcation algorithms controlled by fuzzy logic system in apache spark. IEEE Trans. Netw. Service Manag. 16(3), 936–949 (2019) Dept of IT 12