| Literature DB >> 35132282 |
Akshat Gaurav1, Brij B Gupta2,3,4, Prabin Kumar Panigrahi5.
Abstract
The current COVID-19 issue has altered the way of doing business. Now that most customers prefer to do business online, many companies are shifting their business models, which attracts cyber attackers to launch several kinds of cyberattacks against commercial companies simultaneously. The most common and lethal DDoS attack disables the victim's online resources. While large businesses can afford defensive measures against DDoS assaults, the situation is different for new entrepreneurs. Their lack of security resources restricts their ability to ward off DDoS attacks. Here, we aim to highlight the problems that prospective entrepreneurs should be aware of before joining the business, followed by a filtering mechanism that efficiently identifies DDoS assaults in the COVID-19 scenario, which is the subject of our research. The suggested approach employs statistical and machine learning techniques to discriminate between DDoS attack data and regular communication. Our suggested framework is cost-effective and identifies DDoS attack traffic with a 92.8% accuracy rate.Entities:
Keywords: DDoS; Entropy; Flash crowd; Machine learning; Small entrepreneurs
Year: 2022 PMID: 35132282 PMCID: PMC8810391 DOI: 10.1016/j.techfore.2022.121554
Source DB: PubMed Journal: Technol Forecast Soc Change ISSN: 0040-1625
Fig. 1DDoS attack in small and medium enterprises.
Fig. 2DDoS statics by azure (Azure, 2021).
Fig. 3Decision tree classifier.
Algorithm 1Decision Tree Classifier.
Fig. 4Random forest technique.
Algorithm 2Gradient Boosting (Natekin and Knoll, 2013).
Algorithm 3Filtering.
Attributes used in algorithm .
| Term | Explanation |
|---|---|
| Pk | |
| Ai[k] | Kth attribute of |
| H[k] | Entropy Value for |
| Normal Data rate | |
| Current Data rate |
Fig. 5Dataset representation.
Fig. 6Confusion matrix for different machine learning models.
Comparison of different Machine Learning techniques .
| Parameter | MNB | LR | DTC | GBC | RF | SVM |
|---|---|---|---|---|---|---|
| Accuracy | 0.921 | 0.9284 | 0.92 | 0.9266 | 0.921 | 0.9280 |
| Precision | 0.94 | 0.93 | 0.94 | 0.93 | 0.94 | 0.94 |
| Recall | 0.98 | 0.99 | 0.98 | 0.99 | 0.98 | 0.99 |
| F1 score | 0.96 | 0.96 | 0.96 | 0.96 | 0.96 | 0.96 |
Fig. 7Statistical parameters calculation.
Classification of small and medium entrepreneurs (Berisha andPula, 2015).
| Category | European Union | World Bank | ||
|---|---|---|---|---|
| Head Count | Turnover (million) | Total Employe | Total Assets (million) | |
| Medium | ||||
| Small | ||||
| Micro | ||||
Comparison of different approaches .
| Approach | Complexity | Detection rate | Remarks |
|---|---|---|---|
| ( | Low | High | SDN based |
| ( | Low | High | SDN based |
| ( | Moderate | High | IBE based |
| ( | Moderate | High | IBS signature based |
| ( | Low | Moderate | RFID tags |
| ( | Low | Moderate | Boosting based |