{% extends "base.html" %} {% block content %}
This project detects **Distributed Denial of Service (DDoS) Attacks** in network traffic using Machine Learning. It analyzes input features such as protocol type, packet size, flow duration, and other network parameters to classify whether the traffic is normal or under attack.
DDoS attacks overwhelm a system by flooding it with traffic, disrupting services. Traditional security measures struggle to detect **sophisticated attack patterns**. This project aims to provide an **automated, ML-based** approach to identifying such attacks.
| Feature Name | Description |
|---|---|
| Protocol | Indicates network protocol type (e.g., TCP, UDP) |
| Flow Duration | Total time of network flow |
| Total Fwd Packets | Number of packets sent forward |
| Total Backward Packets | Number of packets sent backward |
| Flow Bytes/s | Rate of bytes per second |
We use **XGBoost**, a high-performance, optimized gradient boosting algorithm that efficiently classifies network traffic patterns.
The input features are normalized using **Min-Max Scaling** to improve model accuracy.
| Predicted Class | Description |
|---|---|
| Benign | Normal network traffic |
| DrDoS_DNS | DNS-based DDoS attack detected |
| DrDoS_UDP | UDP-based DDoS attack detected |
| WebDDoS | Web-based DDoS attack detected |
The Flask framework is used to create a web-based interface for the model.
The trained XGBoost model is integrated into the Flask app for predictions.
Bootstrap is used for a responsive and user-friendly interface.