Improving distributed denial of service attack detection using supervised machine learning

Measurement: Sensors - Tập 30 - Trang 100911 - 2023
Afrah Fathima1,2, G. Shree Devi1, Mohd Faizaanuddin3
1Dept.of Computer Applications, BSAR Crescent Institute of Science and Technology, Chennai, India
2Dept. Of CS & IT, Maulana Azad National Urdu University, Hyderabad, India
3Dept. of AI & Data Science, M.Tech Chaitanya Bharathi Institute of Technology, Hyderabad, India

Tài liệu tham khảo

Kaur, 2016, Empirical analysis of Web attacks, Proc. Comput. Sci., 78, 298, 10.1016/j.procs.2016.02.057 Islam, 2017, A robust incremental clustering-based facial feature tracking, Appl. Soft Comput., 53, 34, 10.1016/j.asoc.2016.12.033 Jeya, 2012, Efficient classifier for r2l and u2r attacks, Int. J. Comput. Appl., 45, 28 Kang, 2012, Anomaly intrusion detection based on clustering a data stream, Int. J. Future Comput. Commun., 1, 17, 10.7763/IJFCC.2012.V1.5 Kim, 2017, A novel hybrid intrusion detection method integrating anomaly detection with misuse detection, Expert Syst. Appl., 41, 1690, 10.1016/j.eswa.2013.08.066 Ramasubramanian, 2017 Feng, 2014, Mining network data for intrusion detection through combining Svms with ant colony networks, Future Generat. Comput. Syst., 37, 127, 10.1016/j.future.2013.06.027 Muniyandi, 2012, Network anomaly detection by cascading k-means clustering and C4.5 decision tree algorithm, Procedia Eng., 30, 174, 10.1016/j.proeng.2012.01.849 Cheng, 2018, An abnormal network flow feature sequence prediction approach for DDoS attacks detection in the big data environment, Comput. Mater. Continua (CMC), 55, 95 Depren, 2005, An intelligent intrusion detection system (ids) for anomaly and misuse detection in computer networks, Expert Syst. Appl., 29, 713, 10.1016/j.eswa.2005.05.002 Qiu, 2020, Nei-TTE: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city, IEEE Trans. Ind. Inf., 16, 2659, 10.1109/TII.2019.2943906 Ajagekar, 2016, Study on web DDOS attacks detection using multinomial classifier Kim, 2008 Calix, 2013, Feature ranking and support vector machines classification analysis of the NSL-KDD intrusion detection corpus Panda, 2012, A hybrid intelligent approach for network intrusion detection, Procedia Eng., 30, 1, 10.1016/j.proeng.2012.01.827 Chen, 2007, Hybrid flexible neural tree-based intrusion detection systems, Int. J. Intell. Syst., 22, 337, 10.1002/int.20203 Luo, 2021, A novel web attack detection system for internet of things via ensemble classification, IEEE Trans. Ind. Inf., 17, 5810, 10.1109/TII.2020.3038761 Tian, 2020, Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles, IEEE Internet Things J., 7, 3901, 10.1109/JIOT.2019.2951620 Gaffney, 2001, Evaluation of intrusion detectors: a decision theory approach, 50 Huang, 2016, Clustering time-stamped data using multiple nonnegative matrices factorization, Knowl. Base Syst., 114, 88, 10.1016/j.knosys.2016.10.007