E ISSN: 2583-049X
logo

International Journal of Advanced Multidisciplinary Research and Studies

Volume 6, Issue 1, 2026

Investigating Denial of Service (DOS) Attacks in a High Traffic System



Author(s): Arthur Bupambo, Moses Mupeta

DOI: https://doi.org/10.62225/2583049X.2026.6.1.5766

Abstract:

The increasing reliance on networked systems for communication, commerce, and critical infrastructure has significantly amplified the risk of Denial of Service (DoS) attacks, one of the most prevalent and damaging forms of cyberattacks. These attacks aim to overwhelm a system’s resources, rendering services unavailable to legitimate users, which can have severe consequences for organizations and critical infrastructure. This study focuses on the design, development, and implementation of a machine learning-based classification model capable of detecting and mitigating various types of DoS attacks, including Ping of Death, TCP SYN Flood, and Distributed Denial of Service (DDoS) attacks. To achieve this, simulated network traffic is analyzed to extract critical features such as packet size, protocol type, packet count, source IP, and other behavioral patterns that serve as key indicators of malicious activity. The extracted features are used to train a Random Forest Classifier, a robust machine learning model known for its accuracy and reliability in classification tasks. The proposed system operates in real-time, dynamically analyzing incoming traffic, identifying anomalous patterns associated with DoS attacks, and automatically mitigating them by blocking malicious source IP addresses. This approach not only enhances detection accuracy but also minimizes response time, offering a proactive defense mechanism against evolving cyber threats. A comprehensive evaluation of the system is conducted using key performance metrics, including accuracy, precision, recall, and F1-score, which collectively demonstrate the effectiveness of the model in distinguishing legitimate traffic from malicious traffic. The results reveal that the system achieves a high detection accuracy of 95%, with strong precision and recall values, confirming its capability to identify DoS attacks while minimizing false positives and negatives. The findings of this research contribute to the advancement of machine learning applications in the field of cybersecurity, particularly in the domain of intrusion detection and prevention systems. The integration of machine learning algorithms such as the Random Forest Classifier enables the system to adapt to diverse attack scenarios and high-traffic environments, making it scalable for practical deployment in real-world systems. Furthermore, the system’s ability to operate in real time ensures that critical services remain available to legitimate users, mitigating the economic and operational damage caused by DoS attacks. However, the study also highlights challenges related to resource consumption and scalability, particularly in large-scale networks with significant traffic volumes. These limitations underscore the need for further research to optimize resource usage, improve the scalability of the detection model, and explore additional machine learning techniques to enhance performance further. In conclusion, this study demonstrates the feasibility and effectiveness of a machine learning-based approach to detecting and mitigating DoS attacks, providing a scalable, real-time solution that addresses the growing cybersecurity threats faced by modern networked systems. By offering a high level of accuracy and dynamic response capabilities, the system represents a significant step toward strengthening the resilience of critical infrastructure and organizational networks against cyberattacks. Future research will focus on refining the model for large-scale networks, integrating it with existing cybersecurity frameworks, and exploring hybrid detection methods to address emerging attack patterns and techniques. the study emphasizes the importance of leveraging feature engineering techniques to enhance the performance of the classification model by incorporating temporal and spatial analysis of network traffic. By analyzing traffic flow rates, session durations, and inter-packet intervals, the system can better differentiate between legitimate high-traffic activities and malicious attack patterns. Furthermore, the integration of threat intelligence feeds and real-time network monitoring tools enhances the system’s adaptability to emerging attack vectors and zero-day threats. The model's architecture allows for modular updates, enabling seamless incorporation of new features and machine learning algorithms as attack strategies evolve. To further improve system resilience, the study explores combining traditional signature-based detection with anomaly-based methods to create a hybrid intrusion detection system (HIDS) capable of detecting both known and unknown attack types. This hybrid approach ensures a comprehensive defense mechanism while reducing the likelihood of false positives and negatives. In addition, the study proposes incorporating cloud-based deployment models to enable distributed detection across geographically dispersed networks, offering scalability and robust protection for enterprises operating in diverse environments. Finally, the inclusion of real-time visualizations and alert mechanisms provides administrators with actionable insights into network performance, enabling rapid response and effective resource allocation during attack scenarios.


Keywords: Denial of Service (DoS), Distributed Denial of Service (DDoS), Machine Learning, Random Forest Classifier, Intrusion Detection, Cybersecurity, Real-Time Mitigation, Network Traffic Analysis, Anomaly Detection

Pages: 2040-2051

Download Full Article: Click Here