Abstract
The telecommunication network that is the assemblage of the terminal nodes enables the whole to be connected. The swift progress in the telecommunication networks and the information technology has enabled a seamless connection and the capacity to store and communicate vast scale of information in the form of text and voice that are sensitive. This makes the telecommunication networks prey to multiple cyber-threats of which the DDOS (distributed denial of service) are the more predominant type of the cyber-threat causing the denial of the services to the users. So the paper utilizing the combination of the neural network and the support vector machine presents the detection and the classification method for the DDOS attacks in the telecommunication network. The performance evaluation using the network simulator-2 enables to have the enhanced detection accuracy for the proposed method.
References
- Obaidat, Mohammed S., and Noureddine A. Boudriga. "Fundamentals of Performance Evaluation of Computer and Telecommunications Systems." (2010).
- Papadopoulos, Christos, Robert Lindell, John Mehringer, Alefiya Hussain, and Ramesh Govindan. "Cossack: Coordinated suppression of simultaneous attacks." In Proceedings DARPA Information Survivability Conference and Exposition, vol. 1, pp. 2-13. IEEE, 2003.
- Nazario, Jose. "DDoS attack evolution." Network Security 2008, no. 7 (2008): 7-10.
- https://media.kasperskycontenthub.com/wpcontent/uploads/sites/43/2018/03/07185213/Kaspersky_Telecom_Threats_2016.pdf
- Shields, Clay. "What do we mean by Network Denial of Service." In Proceedings of the 2002 IEEE Workshop on Information Assurance and Security, vol. 4. 2002.
- Mansfield-Devine, Steve. "The growth and evolution of DDoS." Network Security 2015, no. 10 (2015): 13-20.
- David, Jisa, and Ciza Thomas. "DDoS attack detection using fast entropy approach on flow-based network traffic." Procedia Computer Science 50 (2015): 30-36.
- Santanna, Jose Jair, Ricardo de O. Schmidt, Daphne Tuncer, Anna Sperotto, Lisandro Z. Granville, and Aiko Pras. "Quiet Dogs Can Bite: Which Booters Should We Go After, and What Are Our Mitigation Options?." IEEE Communications Magazine 55, no. 7 (2017): 50-56.
- Saied, Alan, Richard E. Overill, and Tomasz Radzik. "Detection of known and unknown DDoS attacks using Artificial Neural Networks." Neurocomputing 172 (2016): 385-393.
- Zhao, Yuntao, Wenbo Zhang, Yongxin Feng, and Bo Yu. "A classification detection algorithm based on joint entropy vector against application-layer DDoS attack." Security and Communication Networks 2018 (2018).
- Dousti, Ramin Ali, Frank Scalzo, and Suresh Bhogavilli. "Automated ddos attack mitigation via bgp messaging." U.S. Patent Application 15/273,510, filed March 22, 2018.
- Newman, Sean. "Under the radar: the danger of stealthy DDoS attacks." Network Security 2019, no. 2 (2019): 18-19.
- Mathews, Alex. "What can machine learning do for information security?." Network Security 2019, no. 4 (2019): 15-17.
