Performance Analysis of DDOS Attack Mitigation using Machine Learning
Implementation Plan:
—————————-
Scenario 1: (Using CCID 2019 dataset)
———————————————-
Step 1: Initially, we create a Software defined network (SDN), it consists of 20-IOT Nodes, 4 Switches and 1 Controller [Floodlight Controller] .
Step 2: Next, we collect, clean and preprocess the data from CCID 2019 dataset
Step 3:Next, we extract statistical and flow-based features based on preprocessed data.
Step 4:Next, we select the best features and train lightweight ML models using Decision Tree, Random Forest and SVM(hybrid approach).
Step 5: Next, we detect and block malicious traffic and monitor incoming flows using a controller data.
Step 6: Finally Plot the performance Metrics:
6.1: Number of IOT Nodes Vs. Detection Accuracy(%)
6.2: Number of IOT Nodes Vs. Latency (ms)
6.3: Number of IOT Nodes vs. Resource usage (%)
Scenario 2: (using LR-HR-DDoS 2024 dataset)
——————————————————
Step 1: Initially, we create a Software defined network (SDN), it consists of 20-IOT Nodes, 4 Switches and 1 Controller [Floodlight Controller] .
Step 2: Next, we collect, clean and preprocess the data from LR-HR DDoS 2024 dataset
Step 3:Next, we extract statistical and flow-based features based on preprocessed data.
Step 4:Next, we select the best features and train lightweight ML models using Decision Tree, Random Forest and SVM(hybrid approach).
Step 5: Next, we detect and block malicious traffic and monitor incoming flows using a controller data.
Step 6: Finally Plot the performance Metrics:
6.1: Number of IOT Nodes Vs. Detection Accuracy(%)
6.2: Number of IOT Nodes Vs. Latency (ms)
6.3: Number of IOT Nodes vs. Resource usage (%)
Scenario 3: (using Synthetic IOT data)
———————————————-
Step 1: Initially, we create a Software defined network (SDN), it consists of 20-IOT Nodes, 4 Switches and 1 Controller [Floodlight Controller] .
Step 2: Then, we generate synthetic SDN traffic data and collect, clean and preprocess the data .
Step 3:Next, we extract statistical and flow-based features based on preprocessed data.
Step 4:Next, we select the best features and train lightweight ML models using Decision Tree, Random Forest and SVM(hybrid approach).
Step 5: Next, we detect and block malicious traffic and monitor incoming flows using a controller data.
Step 6: Finally Plot the performance Metrics:
6.1: Number of IOT Nodes Vs. Detection Accuracy(%)
6.2: Number of IOT Nodes Vs. Latency (ms)
6.3: Number of IOT Nodes vs. Resource usage (%)
Software requirement:
—————————
1. Development Tool:
i) Mininet-2.0 or Above Version
ii) Python-2.7 or Above version
iii) Wireshark [If needed]
2. Operating System: Ubuntu 16.04 LTS (64-bit) or Above
Dataset:
———-
1) Link : https://www.kaggle.com/datasets/tarundhamor/cicids-2019-dataset (Scenario 1)
2) Link : https://www.kaggle.com/datasets/abdussalamahmed/lr-hr-ddos-2024-dataset-for-sdn-based-networks (Scenario 2)
Note:
——-
1) If the plan does not meet your requirements, provide detailed steps, parameters, models, or expected results in advance. Once implemented, changes won’t be possible without prior input; otherwise, we’ll proceed as per our implementation plan.
2) If the plan satisfies your requirement, Please confirm with us.
3) Project based on Simulation only, not a real time project.
4) Please understand that any modifications made to the confirmed implementation plan will not be made after the project development.
5) If you have any changes in the dataset, kindly provide us before implementation.
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |