Feature Selection using Information Gain Method for Building Classification Model DDoS Attack at Application Layer
Abstract
Full Text:
PDFReferences
C. Douligeris and D. N. Serpanos, Network security Current Status and Future Direcetions. 2007.
J. Bradshaw, “HSBC online banking crashes after cyber attack,†The Telegraph web, 2016. [Online]. Available: https://www.telegraph.co.uk/finance/newsbysector/banksandfinance/12129411/HSBC-online-banking-service-crashes-again.html.
A. Kharpal, “Hack attack leaves 1,400 airline passengers grounded,†CNBC Web, 2015. [Online]. Available: https://www.cnbc.com/2015/06/22/hack-attack-leaves-1400-passengers-of-polish-airline-lot-grounded.html.
O. Kupreev, E. Badovskaya, and A. Gutnikov, “DDoS attacks in Q3 2018,†Securelist, 2018. [Online]. Available: https://securelist.com/ddos-report-in-q3-2018/88617/.
B. Nagpal, P. Sharma, N. Chauhan, and A. Panesar, “DDoS tools: Classification, analysis and comparison,†2015 Int. Conf. Comput. Sustain. Glob. Dev. INDIACom 2015, pp. 342–346, 2015.
Verisign, “Verisign Distributed Denial of Service Report,†2018.
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, “DDoS-shield: DDoS-resilient scheduling to counter application layer attacks,†IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 26–39, 2009.
K. J. Singh and T. De, “MLP-GA based algorithm to detect application layer DDoS attack,†J. Inf. Secur. Appl., vol. 36, pp. 145–153, 2017.
I. Ko, D. Chambers, and E. Barrett, “Self-supervised network traffic management for DDoS mitigation within the ISP domain,†Futur. Gener. Comput. Syst., vol. 112, pp. 524–533, 2020.
V. Bolón-Canedo, N. Sánchez-Maroño, and A. Alonso-Betanzos, “Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset,†Expert Syst. Appl., vol. 38, no. 5, pp. 5947–5957, 2011.
O. Osanaiye, H. Cai, K. K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,†Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016.
K. Kumar, G. Kumar, and Y. Kumarâ€, “Feature Selection Approach for Intrusion Detection Systemâ€,†Int. J. Adv. Trends Comput. Sci. Eng., vol. 2, no. 5, pp. 47–53, 2013.
M. Wang, Y. Lu, and J. Qin, “A dynamic MLP-based DDoS attack detection method using feature selection and feedback,†Comput. Secur., vol. 88, 2020.
S. Agrawal and R. Singh Rajput, “Denial of Services Attack Detection using Random Forest Classifier with Information Gain,†Int. J. Eng. Dev. Res., vol. 5, no. 3, pp. 929–938, 2017.
N. Farnaaz and M. A. Jabbar, “Random Forest Modeling for Network Intrusion Detection System,†Procedia Comput. Sci., vol. 89, pp. 213–217, 2016.
A. K. Hakim, M. Abdurohman, and F. A. Yulianto, “Improving DDoS detection accuracy using Six-Sigma in SDN environment,†Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 2, pp. 365–370, 2018.
A. S. Ahmed, R. Hassan, and N. E. Othman, “Denial of service attack over secure neighbor discovery (SeND),†Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 5, pp. 1897–1904, 2018.
X. K. Li, W. Chen, Q. Zhang, and L. Wu, “Building Auto-Encoder Intrusion Detection System based on random forest feature selection,†Comput. Secur., vol. 95, p. 101851, 2020.
J. Fox and A. Leanage, “R and the Journal of Statistical Software,†J. Stat. Softw., vol. 73, no. 2, 2016.
W. Wang and S. Gombault, “Efficient detection of DDoS attacks with important attributes,†Proc. 2008 3rd Int. Conf. Risks Secur. Internet Syst. Cris. 2008, pp. 61–67, 2008.
T. Shorey, D. Subbaiah, A. Goyal, A. Sakxena, and A. K. Mishra, “Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools,†2018 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2018, pp. 318–322, 2018.
I. Park and S. Lee, “Spatial prediction of landslide susceptibility using a decision tree approach: a case study of the Pyeongchang area, Korea,†Int. J. Remote Sens., vol. 35, no. 16, pp. 6089–6112, 2014.
L. Breiman, “Random forests,†Mach. Learn., vol. 45, pp. 5–32, 2001.
A. Verikas, A. Gelzinis, and M. Bacauskiene, “Mining data with random forests: A survey and results of new tests,†Pattern Recognit., vol. 44, no. 2, pp. 330–349, 2011.
C. Zhang and Y. Ma, Ensemble machine learning: Methods and applications. 2012.
N. P. Lestari, “Uji Recall and Precision Sistem Temu Kembali,†Libr. Net, vol. 5, no. 3, pp. 45–46, 2016.
DOI: http://dx.doi.org/10.18517/ijaseit.12.2.10668
Refbacks
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development