dc.contributor.advisor | Shakil, Arif | |
dc.contributor.advisor | Ahmed, Md Faisal | |
dc.contributor.author | Tahrim, Tasmiah | |
dc.contributor.author | Sharan, MD Asif | |
dc.contributor.author | Monsur, Meshaq | |
dc.contributor.author | Hasan, MD Abid | |
dc.contributor.author | Azad, Tanzina Binte | |
dc.date.accessioned | 2024-06-25T06:23:28Z | |
dc.date.available | 2024-06-25T06:23:28Z | |
dc.date.copyright | ©2023 | |
dc.date.copyright | ©2023 | |
dc.date.issued | 2023-09 | |
dc.identifier.other | ID 19101101 | |
dc.identifier.other | ID 18201134 | |
dc.identifier.other | ID 23341133 | |
dc.identifier.other | ID 18101692 | |
dc.identifier.other | ID 20201217 | |
dc.identifier.uri | http://hdl.handle.net/10361/23575 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2023. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 44-45). | |
dc.description.abstract | The modern era saw the rise of technologies in almost every sector. Computers are
gradually becoming faster and smaller, also allowing people to utilize them almost
everywhere. As computer technology has become an important part to simplify
our life at work, the security of computer networks is one of the hardest challenges
for the technology experts to overcome. Network security is a must because it
protects private information from online attacks and upholds the dependability of
the network. In this study, after reviewing a few previous papers and research
works, we decided to work on the detection process of DDoS that can be used
on the web or server security. Working on the datasets (CICDDoS2019) to merge
them and create a new taxonomy for detecting DDoS attacks was our primary step.
Then, the data were generated for the two types of attack which are Reflection
based and Exploitation based to reduce the time consumption. Thirdly, using the
generated dataset, some Machine Learning based models and classifiers have been
implemented on important features that have the most contributions. For getting
a better accuracy rate, Random Forest, Naive Bayes, Decision Tree and XGBoost
model were applied. Finally, we get a better accuracy rate with these models to
detect the attack in a reduced amount of time. | en_US |
dc.description.statementofresponsibility | Tasmiah Tahrim | |
dc.description.statementofresponsibility | MD Asif Sharan | |
dc.description.statementofresponsibility | Meshaq Monsur | |
dc.description.statementofresponsibility | MD Abid Hasan | |
dc.description.statementofresponsibility | Tanzina Binte Azad | |
dc.format.extent | 57 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | DDoS attack | en_US |
dc.subject | Cyber-security | en_US |
dc.subject | Machine learning | en_US |
dc.subject | Random forest classifier | en_US |
dc.subject | HTTP based protocol | en_US |
dc.subject | Transport layer | en_US |
dc.subject | Application layer | en_US |
dc.subject.lcsh | Computer security | |
dc.subject.lcsh | Machine learning | |
dc.subject.lcsh | HTTP (Computer network protocol) | |
dc.title | A machine learning based approach for DDos attack detection | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B.Sc in Computer Science | |