Performance Evaluation Of Machine Learning Algorithms For Detection Of Syn Flood Attack The Case Of Ethio Telecom

Telecommunication Engineering Project Topics

Get the Complete Project Materials Now! »

Telecom service providers operate and control complex network infrastructurernused for data transmission. However, security issues have been among the mostrnserious problems for service providers in general and ethio telecom in particularly.rnOne of the main security problems that become the hardest and most seriousrnthreat is called Distributed Denial of Service (DDoS) attacks specifically Synchronizern(SYN) flood attack. Nowadays, different researchers to detect and preventrnSYN flood attack recommended several statistical detection methods. However,rndue to the dynamic behavior of attack has been challenged to detect using existingrndetection approaches.rnThis research focused on the performance evaluation classification machine learningrn(ML) algorithms for detection SYN flood attack. The classification modelsrntrained and tested with packet captured (PCAP) dataset has been used and gatheredrnfrom ethio telecom network by generated and captured using Hping3rnandrnWireshark tools respectively. This dataset has been further preprocessed and evaluatedrnusing four classification ML algorithms and three training approaches. Thernimplementation has been performed using WEKA (Waikato Environment for KnowledgernAnalysis) data mining tool.rnThe experimental results show J48 algorithm performs with 98.57% of accuracyrnand AdaBoost, Naïve Bayes and ANN algorithms with 98.52%, 95.31% and 94.85%rnof accuracy respectively. The first reason was that the J48 algorithm is more efficientrnthan the other algorithms; it has been used as a pruning technique in orderrnto reduce the complexity of the final classifier and to prevent over fitting the data.rnThe second reason was the ability to learn mechanisms. Therefore, based on thernperformance evaluation result model with J48 algorithm has been recommendedrnfor SYN attack detection.

Get Full Work

Report copyright infringement or plagiarism

Be the First to Share On Social



1GB data
1GB data

RELATED TOPICS

1GB data
1GB data
Performance Evaluation Of Machine Learning Algorithms For Detection Of Syn Flood Attack The Case Of Ethio Telecom

233