Skip to main content

The effectiveness of data mining techniques in the detection of DDoS attacks

  • Conference paper
  • First Online:
Distributed Computing and Artificial Intelligence, 14th International Conference (DCAI 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 620))

Abstract

The term of online attacks appeared in public space in the area of computer networks long ago. The effects of these actions can be difficult to rectify and also very expensive. For early detection of such attacks, one can use different methods to analyze the input data generated by the network communication interfaces. The article presented the results of the research on effectiveness of data mining techniques in the detection of DDoS attacks on the selected network resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • 1. Ashari A., Paryudi I., Tjoa M.: Performance Comparison between Nave Bayes, Decision Tree and k-Nearest Neighbor in Searching Alternative Design in an Energy Simulation. International Journal of Advanced Computer Science and Applications, Vol. 4, No. 11, pp. 33–39, Bradford UK, 2013.

    Google Scholar 

  • 2. Bandara K.R.W.V., et al.: Preventing DDoS attack using Data mining Algorithms. International Journal of Scientic and Research Publications, Vol. 6, Issue 10, pp. 390–400, 2016.

    Google Scholar 

  • 3. BISHOP C. M., Pattern Recognition and Machine Learning, Springer, 2006.

    Google Scholar 

  • 4. Zhong R., Guangxue Y.: DDoS Detection System Based on Data Mining. Proceedings of the ISNNS 10, pp. 062–065, Jinggangshan, P. R. China, 2010.

    Google Scholar 

  • 5. Czyczyn-Egird D., Wojszczyk R.: Determining the Popularity of Design Patterns Used by Programmers Based on the Analysis of Questions and Answers on Stackoverow.com Social Network. 23rd Conference Computer Networks, series Communications in Computer and Information Science, Springer, Vol. 608, pp. 421–433, Brunow, 2016.

    Google Scholar 

  • 6. Gorski G.: Novel Multistage authorization Protocol. Information Systems Architecture and Technology: Service Oriented Networked Systems. Wroclaw University of Technology. pp. 221–230, Wroclaw, 2011.

    Google Scholar 

  • 7. Hassanat A. B., et al.: Solving the Problem of the K Parameter in the KNN Classifier Using an Ensemble Learning Approach. International Journal of Computer Science and Information Security, Vol. 12, No. 8, pp. 33–39, Ptitsburgh USA, 2014.

    Google Scholar 

  • 8. HeeKyoung Yi, et al.: DDoS Detection Algorithm Using the Bidirectional Session. 18th Conference Computer Networks, series Communications in Computer and Information Science, Vol. 160, pp. 191–203, Ustron, 2011.

    Google Scholar 

  • 9. https://msdn.microsoft.com/en-us/library/ms123401.aspx

  • 10. https://www.xlstat.com/en/

  • 11. Troelsen A.: Pro C# 2008 and the .NET 3.5 Platform. Apress, New York, 2007.

    Google Scholar 

  • 12. Wojszczyk R.: The Process of Verifying the Implementation of Design Patterns Used Data Models. Advances in Intelligent Systems and Computing, Vol. 521, pp. 103–116, 2017.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Czyczyn-Egird .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Czyczyn-Egird, D., Wojszczyk, R. (2018). The effectiveness of data mining techniques in the detection of DDoS attacks. In: Omatu, S., RodrĂ­guez, S., Villarrubia, G., Faria, P., Sitek, P., Prieto, J. (eds) Distributed Computing and Artificial Intelligence, 14th International Conference. DCAI 2017. Advances in Intelligent Systems and Computing, vol 620. Springer, Cham. https://doi.org/10.1007/978-3-319-62410-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62410-5_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62409-9

  • Online ISBN: 978-3-319-62410-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics