Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/465909
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2023-03-03T06:43:41Z-
dc.date.available2023-03-03T06:43:41Z-
dc.identifier.urihttp://hdl.handle.net/10603/465909-
dc.description.abstractThe use of network-connected devices is expanding quickly in the digital age, in- creasing the number of cyber attacks. The Distributed Denial of Service (DDoS) at- tacks are one type of such cyber-attacks that are getting harder to resist, costing its victims or targets in terms of their revenue, customers, reputation etc. According to Gartner, the moderate expense of IT services downtime is $5,600 per minute. It can range from $140,000 to $300,000 per hour on average and go as high as $540,000 per hour. Cisco forecasts that the maximum count of DDoS attacks may double between the years 2018 to 2023, from 7.9 to over 15 million. In addition, DDoS attacks are becoming more sophisticated causing devastation. In recent years, several models for identifying such attacks have been described in the literature. However, it remains a tough problem due to multiple traffic signatures and attack volume variations. newlineTo address this problem, this thesis proposes various detection approaches by handling traffic noises, class imbalances, optimizing memory utilization, reducing training times, and provides the explanations that lead to the particular decisions in the model. Initially, a promising new automatic DDoS detection methodology is designed by condensing the feature space that minimizes model overfitting and improve the model s generalization. Then, a fast processing and robust DDoS detection model is developed, using memory optimization to improve the processing speed and designed extreme learning machines model by varying the parameters such as activation functions, weights, and neurons. Further, an autoencoder-based light gradient boost model is implemented to detect massive volumes of anonymous attacks, capable of detecting un- known or zero-day network attacks while maintaining a high-efficiency level. Thus, the model is analyzed in balanced and imbalanced data scenarios. Finally, an explainable AI framework is designed to provide transparency in the decisions made in the feature selection process and extracts the m
dc.format.extentxvi,162
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleDetection of Distributed Denial of Service Attacks
dc.title.alternative
dc.creator.researcherRajkumar, Batchu
dc.subject.keywordClass imbalance
dc.subject.keywordDDoS attacks
dc.subject.keywordFeature selection
dc.description.note
dc.contributor.guideSeetha, Hari
dc.publisher.placeAmaravati
dc.publisher.universityVellore Institute of Technology (VIT-AP)
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered2018
dc.date.completed2022
dc.date.awarded2022
dc.format.dimensions29x20
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File117.23 kBAdobe PDFView/Open
02_prelim pages.pdf1.39 MBAdobe PDFView/Open
03_content.pdf506.24 kBAdobe PDFView/Open
04_ abstract.pdf238.67 kBAdobe PDFView/Open
05_ chapter-1.pdf5.44 MBAdobe PDFView/Open
06_chapter-2.pdf8.2 MBAdobe PDFView/Open
07_chapter-3.pdf4.93 MBAdobe PDFView/Open
08_chapter-4.pdf6.94 MBAdobe PDFView/Open
09_chapter-5.pdf4.29 MBAdobe PDFView/Open
10_chapter-6.pdf8.73 MBAdobe PDFView/Open
11_annexures_references_and_publications.pdf3.67 MBAdobe PDFView/Open
80_recommendation.pdf235.35 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: