Design and Development of Collaborative Detection and Taxonomy of DDoS Attacks Using ESVM


  • S. Ravichandran Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, Tamil Nadu, India
  • M. Umamaheswari Professor, Department of Information Technology, RRASE College of Engineering, Chennai, Tamil Nadu, India



DDOS, Intrusion detection, Anomaly detection, ESVM, String kernels


Distributed Denial of Service (DDoS) assault is a ceaseless basic risk to the web. Application layer DDoS Attack is gotten from the lower layers. Application layer based DDoS assaults utilize honest to goodness HTTP asks for after foundation of TCP three-way handshaking and overpowers the casualty assets, for example, attachments, CPU, memory, circle, database transfer speed. Arrange layer based DDoS assaults sends the SYN, UDP and ICMP solicitations to the server and debilitates the transfer speed. An oddity discovery system is proposed in this paper to identify DDoS assaults utilizing Enhanced Support Vector Machine (ESVM). The Application layer DDoS Attack, for example, HTTP Flooding, DNS Spoofing and Network layer DDoS Attack, for example, Port Scanning, TCP Flooding, UDP Flooding, ICMP Flooding, Land Flooding. Session Flooding is taken as test tests for ESVM. The Normal client gets to conduct characteristics is taken as preparing tests for ESVM. The movement from the testing tests and preparing tests are Cross Validated and the better arrangement exactness is acquired. Application and Network layer DDoS assaults are arranged with order exactness of 99 % with ESVM.


J. Yu and Z. Li, "A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks," in IEEE Third International Conference on Networking and Services, pp. 54-54, 2007.

Y. Kim, W. C. Lau, M. C. Chuah, and J. Chao, "Packet Score: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks," IEEE Transactions on [Journal Name].

P. Velarde-Alvarado, P. Vargas-Rosales, C. Torres-Roman, D. Martinez-Herrera, and A. "Detecting anomalies in network traffic using the method of remaining elements," IEEE Communications Letters.

A. Ramamoorthi, T. Subbulakshmi, and S. Mercy Shalinie, "Real-Time Detection and Classification of DDoS Attacks using Enhanced SVM with String Kernels," Department of Computer Science and Engineering, Thiyagarajar College of Engineering, Madurai, Tamil Nadu, India.

Y. Xie and S.-Z. Yu, "Monitoring the Application layer DDoS Attacks for Popular Websites," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 15-25, 2009.

Y. Xie and S.-Z. Yu, "A Novel Model for Detecting Application Layer DDoS Attacks," in IEEE Proc. of the First International Multi-Symposiums on Computer and Computational Science, pp. 56-63, 2008.

E.A.V. Navarro, J.R. Mas, J.F. Navajas, and C.P. Alcega (2006), "Performance of a 3G-based mobile telemedicine system," in Proceedings of IEEE CCNC, Las Vegas, pp. 1023-1027.

L. Qiao, P. and Koutsakis (2008), "Guaranteed bandwidth allocation and QoS support for mobile telemedicine traffic," in Proceedings of IEEE Sarnoff Symposium, PrincetonS, NJ, pp. 1-5.




How to Cite

Ravichandran, S., & Umamaheswari, M. (2017). Design and Development of Collaborative Detection and Taxonomy of DDoS Attacks Using ESVM. Asian Journal of Computer Science and Technology, 6(2), 27–32.

Most read articles by the same author(s)

1 2 > >>