DDoS attacks prediction in a simulation environment by means of data mining techniques

Daniel Czyczyn-Egird, Rafał Wojszczyk


The notion of Internet attacks has been well-known in the area of computer networks for a long time now. The effects of these actions can be difficult to rectify and also very expensive.  Therefore, these harmful attacks should be detected in the shortest time possible when the effects are still quite easily reversible. The article presented the results of the research on predicting the occurrence of DoS attacks on the selected network resources by using data mining techniques.


computer networks; data mining; DDoS attack

Full Text:



Bandara K.R.W.V., et al.: Preventing DDoS Attack Using Data Mining Algorithms. International Journal of Scientific and Research Publications, vol. 6, issue 10, 2016, p. 390÷400.

Czyczyn-Egird D., Wojszczyk R.: Determining the Popularity of Design Patterns Used by Programmers Based on the Analysis of Questions and Answers on Stackoverflow.com Social Network. 23rd Conference on Computer Networks, CCSI, Springer, vol. 608, 2016, p. 421÷433.

HeeKyoung Yi, et al.: DDoS Detection Algorithm Using the Bidirectional Session. 18th Conference on Computer Networks, CCIS, Springer, vol. 160, Ustroń 2011, p. 191÷203.

Giovanni C.: Topology of Denial-of-Service. Endeavor Systems Inc. 2000.

Gulay O., Georgios L.: A Denial of Service Detector Based on Maximum Likeli-hood Detection and the Random Neural Network. Computer Journal, vol. 50, issue 6, November 2007, p. 717÷727.

Thapngam T., Yu S., Zhou W., Makki S. K.: Distributed Denial of Service (DDoS) Detection by Traffic Pattern Analysis. Peer-to-Peer Networking and Applications, 2012, p. 1÷13.

Rahmani H., Sahli N., Kamoun F.: DDoS Flooding Attack Detection Scheme Based on F-divergence. Computer Communications, vol. 35, 2012, p. 1380÷1391.

Zhong R., Guangxue Y.: DDoS Detection System Based on Data Mining. Proceedings of the Second International Symposium on Networking and Network Security ISNNS ’10, Jinggangshan, P. R. China 2010, p. 62÷65.

Górski G.: Novel Multistage Authorization Protocol. Information Systems Architecture and Technology: Service Oriented Networked Systems, Wroclaw University of Technology, Wrocław 2010, p. 221÷230.

Griffiths I., Adams M., Liberty J.: Programming C# 4.0: Building Windows, Web, and RIA Applications for the .NET 4.0 Framework. O'Reilly Media, 2010.

Wojszczyk R.: The Process of Verifying the Implementation of Design Patterns – Used Data Models. Advances in Intelligent Systems and Computing, vol. 521, 2017, p. 103÷116.

Troelsen A.: Pro C# 2008 and the .NET 3.5 Platform. Apress, New York 2007.


Ashari A., Paryudi I., Tjoa M.: Performance Comparison Between Naïve Bayes, Decision Tree and k-Nearest Neighbor in Searching Alternative Design in an Energy Simulation Tool. International Journal of Advanced Computer Science and Applications, vol. 4, no. 11, Bradford UK 2013, p. 33÷39.

Bishop C. M., Pattern Recognition and Machine Learning, Springer, 2006.


Hassanat A. B., et al.: Solving the Problem of the K Parameter in the KNN Classifier Using an Ensemble Learning Approach. International Journal of Computer Science and Information Security, vol. 12, no. 8, Pittsburgh USA 2014, p. 33÷39.

DOI: http://dx.doi.org/10.21936/si2017_v38.n3.807