Performance Analysis of DDOS Attack Mitigation using ML

Performance Analysis of DDOS Attack Mitigation using ML

Performance Analysis of DDOS Attack Mitigation using Machine Learning

Implementation Plan:
—————————-

Scenario 1: (Using CCID 2019 dataset)
———————————————-

Step 1: Initially, we create a Software defined network (SDN), it consists of 20-IOT Nodes, 4 Switches and 1 Controller [Floodlight Controller] .

Step 2: Next, we collect, clean and preprocess the data from CCID 2019 dataset

Step 3:Next, we extract statistical and flow-based features based on preprocessed data.

Step 4:Next, we select the best features and train lightweight ML models using Decision Tree, Random Forest and SVM(hybrid approach).

Step 5: Next, we detect and block malicious traffic and monitor incoming flows using a controller data.

Step 6: Finally Plot the performance Metrics:

6.1: Number of IOT Nodes Vs. Detection Accuracy(%)

6.2: Number of IOT Nodes Vs. Latency (ms)

6.3: Number of IOT Nodes vs. Resource usage (%)

Scenario 2: (using LR-HR-DDoS 2024 dataset)
——————————————————

Step 1: Initially, we create a Software defined network (SDN), it consists of 20-IOT Nodes, 4 Switches and 1 Controller [Floodlight Controller] .

Step 2: Next, we collect, clean and preprocess the data from LR-HR DDoS 2024 dataset

Step 3:Next, we extract statistical and flow-based features based on preprocessed data.

Step 4:Next, we select the best features and train lightweight ML models using Decision Tree, Random Forest and SVM(hybrid approach).

Step 5: Next, we detect and block malicious traffic and monitor incoming flows using a controller data.

Step 6: Finally Plot the performance Metrics:

6.1: Number of IOT Nodes Vs. Detection Accuracy(%)

6.2: Number of IOT Nodes Vs. Latency (ms)

6.3: Number of IOT Nodes vs. Resource usage (%)

Scenario 3: (using Synthetic IOT data)
———————————————-

Step 1: Initially, we create a Software defined network (SDN), it consists of 20-IOT Nodes, 4 Switches and 1 Controller [Floodlight Controller] .

Step 2: Then, we generate synthetic SDN traffic data and collect, clean and preprocess the data .

Step 3:Next, we extract statistical and flow-based features based on preprocessed data.

Step 4:Next, we select the best features and train lightweight ML models using Decision Tree, Random Forest and SVM(hybrid approach).

Step 5: Next, we detect and block malicious traffic and monitor incoming flows using a controller data.

Step 6: Finally Plot the performance Metrics:

6.1: Number of IOT Nodes Vs. Detection Accuracy(%)

6.2: Number of IOT Nodes Vs. Latency (ms)

6.3: Number of IOT Nodes vs. Resource usage (%)

Software requirement:
—————————

1. Development Tool:

i) Mininet-2.0 or Above Version

ii) Python-2.7 or Above version

iii) Wireshark [If needed]

2. Operating System: Ubuntu 16.04 LTS (64-bit) or Above

Dataset:
———-

1) Link : https://www.kaggle.com/datasets/tarundhamor/cicids-2019-dataset (Scenario 1)

2) Link : https://www.kaggle.com/datasets/abdussalamahmed/lr-hr-ddos-2024-dataset-for-sdn-based-networks (Scenario 2)

Note:
——-

1) If the plan does not meet your requirements, provide detailed steps, parameters, models, or expected results in advance. Once implemented, changes won’t be possible without prior input; otherwise, we’ll proceed as per our implementation plan.

2) If the plan satisfies your requirement, Please confirm with us.

3) Project based on Simulation only, not a real time project.

4) Please understand that any modifications made to the confirmed implementation plan will not be made after the project development.

5) If you have any changes in the dataset, kindly provide us before implementation.

Live Tasks
Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Workflow

YouTube Channel

Unlimited Network Simulation Results available here.

Related Topics