IJSATE032503
IJSATE032503
Perceptron (MLP). It trains each model on X_train and in them, which are probably TCP flag columns like SYN,
y_train, then predicts on X_test to compute performance ACK, FIN, RST, PSH, and URG. These flags are used to
metrics: accuracy, precision, recall, F1-score, ROC AUC identify various kinds of network activity, such as normal
score, and cross-validation score. Additionally, it plots ROC communication and possible cyber-attacks. To examine the
curves for each model and class, helping visualize distribution of the flags, the script loops through each flag
classification performance. A summary DataFrame is created column and creates count plots with seaborn. The plots show
the number of each flag by attack type (label). This
to compare model results, and the scores are displayed using a
visualization allows patterns in flag usage between normal and
heatmap for better interpretation. This function provides a
malicious traffic to be discerned. For instance, an unusually
streamlined and visual approach to selecting the best-
high frequency of SYN flags with no matching ACK
performing model. responses would reveal a SYN flood attack, whereas an
overwhelming number of RST flags might reveal a disruption
of ongoing connections. Through packet flag distributions
being analysed, the model is able to capture anomalies
distinguishing between good and DDoS attack traffic and
enhance classification accuracy and real-time detection of
threats. The distribution of FIN flags, as given in Figure 4,
reveals the closure of a connection. The figure proposes that
benign traffic has a tremendous number of FIN flags, but
attack traffic changes in distribution as some attack vectors
have drastically smaller occurrences. The SYN flag
distribution, critical in the creation of TCP connections, is
pointed out in Figure 5. Benign traffic will have a greater SYN
flag number, but some attacks like Denial-of-Service (DoS)
attacks could have more SYN flags because of SYN flooding.
In the same way, Figure 6 shows the distribution of ACK flag
counts, where benign traffic has a majority of ACK flags to
Figure 3: ROC Curve ensure packet acknowledgment. But there are some categories
of attacks that show less occurrence of ACK flags, which may
be indicative of connection hijacking or partial handshakes.
Figure 7 discusses the distribution of RST flag counts, which
C. Packet Flags and Attack Patterns are used to reset TCP connections. In attack traffic, the RST
Packet flags are essential indicators of network traffic patterns flag count is occasionally higher, which may be indicative of
and are an important factor in identifying DDoS attacks. attempts to destroy active connections or avoid detection
The script takes all column names in the data that have "flag_" systems.Looking ahead, Figure 8 is the PSH flag count
V. CONCLUSION
The Smart DDoS Detection and Mitigation System offers a
sophisticated and effective way to tackle DDoS attacks, which
are a major cybersecurity concern. By utilizing real-time
traffic monitoring, machine learning for detection, and
automated responses, the system guarantees high availability
and strong security for web applications. Its intelligent
detection capabilities allow for the proactive identification and
blocking of malicious IPs, reducing the chances of service
interruptions, downtime, and financial losses.
With its modular and scalable design, the system can
seamlessly adapt to cloud and on-premises infrastructures,
making it a versatile solution for various deployment
environments. The emphasis on automation and minimal
human intervention enhances operational efficiency, enabling
organizations to respond swiftly to emerging cyber threats.
This comprehensive approach significantly strengthens the
security posture of businesses, ensuring resilience against
Figure 16: Use Case Diagram
evolving attack patterns while maintaining uninterrupted
c) service
S for legitimate users.
equence Diagram
7
VI .ACKNOWLEDGEMENT
This work was supported by Dr. SandhyaRani
Kundra Associate Professor of department of Information
Technology contributed towards the Project for building
application. This support is greatly appreciated.
VII .REFERENCES
[1] Dr. Mahdi Rabbani, “Enhancing Generalizability in DDoS Attack
De- tection Systems through Transfer Learning and Ensemble
Learning Ap- proaches,” https://www.unb.ca/cic/datasets/ddos-
2019.html?utm source.