Acta Scientific Computer Sciences

Research Article Volume 5 Issue 1

Framework for Monitoring and Detection of DDOS Attacks using ML Algorithms

Batool Mastoi* and Gul Bano

Department of software Engineering, Mehran University of Engineering and Technology, Jamshoro, Sindh, Pakistan

*Corresponding Author: Batool Mastoi, Department of software Engineering, Mehran University of Engineering and Technology, Jamshoro, Sindh, Pakistan

Received: December 20, 2022; Published: December 27, 2022


DDOS attacks have become a widespread problem on the internet these days. The DDOS attack is a spiteful effort to dislocate the usual traffic of a targeted server, service, or network by crushing the target or its nearby infrastructure with a flood of Internet traffic. Artificial intelligence and Machine learning proved to be efficient in evaluating the performance of the system by using algorithms. The detection of DDOS attacks is a basic problem in machine learning. Due to the advancement of technology i.e. Cloud computing, it is a significantly difficult task to identify DDOS attacks because of computational complexities. This Study proposes a ML framework for detecting, Monitoring and providing prevention techniques for DDOS attacks and compares the performance of four frequently used algorithms (Nave Bayes, Decision Tree, Random Forest, and SVM). The dataset was validated by performing a T-test. OWASP ZAP and Weka Tool have been used for the analysis. 1031 samples were collected. The study found interesting remarks.

Keywords: DDOs Attack; Ml Algorithms; Owsap Zap; Risk


  1. Iman A and Mamdouh A. “Efficient Denial of Service Attacks Detection in Wireless Sensor Networks”. Journal of Information Science and Engineering (2018): 977-1000.
  2. Barati M., et al. “Distributed Denial of Service Detection Using Hybrid Machine Learning Technique”. International Symposium on Biometrics and Security Technologies (ISBAST) (2014).
  3. Saied A., et al. “Detection of known and unknown DDoS attacks using Artificial Neural Networks”. Neurocomputing (2016): 385-393.
  4. Wang M., et al. “A dynamic MLP-based DDoS attack detection method using feature selection and feedback”. Computers and Security (2020).
  5. Pranckevičius T and Marcinkevičius V. “Comparison of Naïve Bayes, Random Forest, Decision Tree, Support Vector Machines, and Logistic Regression Classifiers for Text Reviews Classification”. Baltic Journal of Modern Computing2 (2017): 221-232.
  6. Mahjabin T., et al. “A survey of distributed denial-of-service attack, prevention, and mitigation technique”. International Journal of Distributed Sensor Networks12 (2017).
  7. Mburano B and Si1 W. “Evaluation of Web Vulnerability Scanners Based on OWASP Benchmark” (2019).
  8. Hall M., et al. “The WEKA Data Mining Software: An Update”. ACM SIGKDD Explorations Newsletter (2014).
  9. Ji S Y., et al. “A multi-level intrusion detection method for abnormal network behaviors”. Journal of Network and Computer Applications (2016): 9-17.
  10. Yusof A R., et al. “Adaptive Feature Selection for Denial of Services (DoS) Attack”. IEEE Conference on Application, Information and Network Security (AINS) (2017).
  11. Guri M., et al. “DDoS: Attacks, Analysis and Mitigation”. IEEE European Symposium on Security and Privacy (2017).
  12. Chadd A. “DDoS attacks: past, present and future”. Network Security, 2018 Elsevier, Network Security (2018): 13-15.
  13. Filho LdsF., et al. “Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning” (2019).
  14. Manavi TM. “Defense mechanisms against Distributed Denial of Service attacks: A survey”. Computers and Electrical Engineering (2018): 26-38.


Citation: Batool Mastoi and Gul Bano. “Framework for Monitoring and Detection of DDOS Attacks using ML Algorithms".Acta Scientific Computer Sciences 5.1 (2023): 144-149.


Copyright: © 2023 Batool Mastoi and Gul Bano. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Acceptance rate35%
Acceptance to publication20-30 days

Indexed In

News and Events

  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is July 10, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US