4.7 Article

An integrated approach explaining the detection of distributed denial of service attacks

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

On improving the performance of DDoS attack detection system

Raj Kumar Batchu et al.

Summary: DDoS attacks prevent regular access by flooding the target with massive traffic, posing significant threats to network security. This study presents a quick and efficient detection model that can identify the latest real-world attacks through effective data preprocessing and feature extraction.

MICROPROCESSORS AND MICROSYSTEMS (2022)

Article Computer Science, Hardware & Architecture

On improving the performance of DDoS attack detection system

Raj Kumar Batchu et al.

Summary: This study proposes a quick and efficient detection model to identify the latest DDoS attacks, improving the model's generalizability through data pre-processing optimization and feature analysis. Experimental results show that the detection accuracy of the model reaches 99.94%.

MICROPROCESSORS AND MICROSYSTEMS (2022)

Article Computer Science, Hardware & Architecture

A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning

Raj Kumar Batchu et al.

Summary: In the digital era, the increased usage of network-connected devices has led to a rise in cyberattacks, with DDoS attacks becoming more complex to detect. By developing a new automatic detection methodology and utilizing approaches like reducing feature space and hyperparameter tuning, the GB model achieved a high accuracy of 99.97% on the CICDDoS2019 dataset.

COMPUTER NETWORKS (2021)

Article Ecology

An evaluation of feature selection methods for environmental data

Dimitrios Effrosynidis et al.

Summary: The study found that the wrapper methods SHAP and Permutation Importance are the most effective, while filter methods perform poorly and embedded methods are intermediate. LightGBM performed better among the two machine learning algorithms used. The ensemble method Reciprocal Ranking outperformed all other methods and showed high stability.

ECOLOGICAL INFORMATICS (2021)

Article Engineering, Multidisciplinary

The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems

Sajad Einy et al.

Summary: Researchers have proposed various methods to address the issue of creating security for data and information exchange, with intrusion detection systems being one of the most important methods. However, the main challenge currently faced is the number of erroneous warning messages generated and the low accuracy of intrusion detection.

MATHEMATICAL PROBLEMS IN ENGINEERING (2021)

Article Computer Science, Information Systems

An effective intrusion detection approach using SVM with naive Bayes feature embedding

Jie Gu et al.

Summary: This paper proposes an effective intrusion detection framework based on SVM and naiv e Bayes feature embedding, and experimental results validate its good and robust performance on multiple datasets.

COMPUTERS & SECURITY (2021)

Article Computer Science, Artificial Intelligence

Detection of DDoS attacks with feed forward based deep neural network model

Abdullah Emir Cil et al.

Summary: It is suggested to use the deep neural network (DNN) as a deep learning model for detecting DDoS attacks, and experiments have shown that the model can detect and classify attacks in network traffic with high accuracy.

EXPERT SYSTEMS WITH APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

An optimal intrusion detection system using recursive feature elimination and ensemble of classifiers

Neha Sharma et al.

Summary: With the increasing dependence on the internet, the need for intrusion detection systems is growing rapidly. This paper proposes a system that uses machine learning to detect attacks, achieving a good classification rate for all attack classes in the KDD CUP 99 dataset.

MICROPROCESSORS AND MICROSYSTEMS (2021)

Article Computer Science, Information Systems

Towards Effective Network Intrusion Detection: From Concept to Creation on Azure Cloud

Smitha Rajagopal et al.

Summary: The proposed study introduces a meta-classification approach using decision jungle for network intrusion detection with high accuracy across multiple datasets. Unlike traditional methods, the solution relies on a 40:60 train-test ratio and demonstrates good detection capabilities for modern attack types.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

Resampling imbalanced data for network intrusion detection datasets

Sikha Bagui et al.

Summary: This research investigates the influence of resampling on the performance of Artificial Neural Network multi-class classifiers, showing that oversampling increases training time while undersampling decreases it; in cases of extreme data imbalance, both oversampling and undersampling significantly increase recall; moderate data imbalances may not be greatly affected by resampling, but with it, especially oversampling, more minority data (attacks) can be detected.

JOURNAL OF BIG DATA (2021)

Article Computer Science, Artificial Intelligence

A cognitive mechanism for mitigating DDoS attacks using the artificial immune system in a cloud environment

Damai Jessica Prathyusha et al.

Summary: This paper proposes the use of artificial immune systems to alleviate DDoS attacks in cloud computing, by identifying the most potential features of the attack, with high detection accuracy and low false alarm rate.

EVOLUTIONARY INTELLIGENCE (2021)

Review Computer Science, Hardware & Architecture

Techniques for Interpretable Machine Learning

Mengnan Du et al.

COMMUNICATIONS OF THE ACM (2020)

Article Computer Science, Information Systems

A dynamic MLP-based DDoS attack detection method using feature selection and feedback

Meng Wang et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Hardware & Architecture

Building an efficient intrusion detection system based on feature selection and ensemble classifier

Yuyang Zhou et al.

COMPUTER NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Near real-time security system applied to SDN environments in IoT networks using convolutional neural network

Marcos V. O. de Assis et al.

COMPUTERS & ELECTRICAL ENGINEERING (2020)

Article Computer Science, Information Systems

FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks

Yizhen Jia et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Engineering, Electrical & Electronic

Detection DDOS Attacks Using Machine Learning Methods

Tugba Aytac et al.

ELECTRICA (2020)

Article Multidisciplinary Sciences

An Adaptive Threshold-Based Attribute Selection to Classify Requests Under DDoS Attack in Cloud-Based Systems

Priyanka Verma et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2020)

Article Computer Science, Information Systems

Long Short-Term Memory and Fuzzy Logic for Anomaly Detection and Mitigation in Software-Defined Network Environment

Matheus P. Novaes et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A new hybrid ensemble feature selection framework for machine learning-based phishing detection system

Kang Leng Chiew et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Hardware & Architecture

The hybrid technique for DDoS detection with supervised learning algorithms

Soodeh Hosseini et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

A survey of network-based intrusion detection data sets

Markus Ring et al.

COMPUTERS & SECURITY (2019)

Review Computer Science, Information Systems

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Tasnuva Mahjabin et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)

Article Computer Science, Artificial Intelligence

From dynamic classifier selection to dynamic ensemble selection

Albert H. R. Ko et al.

PATTERN RECOGNITION (2008)