体育赛事投注记录

体育赛事投注记录advertisement

Feature Reduction-Based DoS Attack Detection System

  • Jahed Momin ShaikhEmail author
  • Deepak Kshirsagar
Conference paper
  • 33 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1162)

Abstract

denial-of-service (dos) has still been popularly used by attackers. it can be seen in china and the usa who are major victims of dos attacks in recent years. for this reason, the development of an intelligent intrusion detection system (ids) remains a challenging task. this study proposes a system for the detection of dos attacks with feature reduction using a rule-based part classifier. the reduced feature set is identified based on the combination of information gain and correlation attribute evaluation methods. the system is implemented and tested on cicids 2017 dataset. finally, the proposed system provides an accuracy of 99.9871% for the detection of dos attacks with 56 reduced features.

Keywords

Rule-based classifiers Feature reduction Information gain Correlation CICIDS 2017 

References

  1. 1.
    Zong, Y., Huang G.: A feature dimension reduction technology for predicting DDoS intrusion behavior in multimedia internet of things. Multimedia Tools Appl. 1–14 (2019)
  2. 2.
    Selvakumar, K., Karuppiah, M., SaiRamesh, L., Hafizul Islam, S.K., Hassan, M.M., Fortino, G., Raymond Choo, K.-K.: Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs. Inform. Sci. 497, 77–90 (2019)
  3. 3.
    Kshirsagar, D., Sale, S.S., Tagad, D.K., Ganpat, K.: Network intrusion detection based on attack pattern. In: 2011 3rd International Conference on Electronics Computer Technology, vol. 5, pp. 283–286. IEEE (2011)
  4. 4.
    Priyadarsini, P.I., Sai, M.S.S., Suneetha, A., Santhi, M.V.B.T.: Robust feature selection technique for intrusion detection system. Inter. J. Control Automation. 11(2), 33–44 (2018)
  5. 5.
    Patgiri, R., Varshney, U., Akutota, T., Kunde, R.: An investigation on intrusion detection system using machine learning. In: 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1684–1691. IEEE (2018)
  6. 6.
    Sornsuwit, P., Jaiyen, S.: A new hybrid machine learning for cybersecurity threat detection based on adaptive boosting. Appl. Artif. Intell. 33(5), 462–482 (2019)
  7. 7.
    Salih, A.A., Abdulrazaq, M.B.: Combining best features selection using three classifiers in intrusion detection system. In: 2019 International Conference on Advanced Science and Engineering (ICOASE), pp. 94–99. IEEE (2019)
  8. 8.
    Manzoor, I., Kumar, N.: A feature reduced intrusion detection system using ANN classifier. Expert Syst. Appl. 88, 249–257 (2017)
  9. 9.
    Pandey, V.C., Peddoju, S.K., Deshpande, P.S.: A statistical and distributed packet filter against DDoS attacks in cloud environment. Sādhanā 43(3), 32 (2018)
  10. 10.
    Velliangiri, S.: A hybrid BGWO with KPCA for intrusion detection. J. Exp. Theor. Artif. Intell., 1–16 (2019)
  11. 11.
    Wankhede, S., Kshirsagar, D.: DoS attack detection using machine learning and neural network. In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1–5. IEEE (2018)
  12. 12.
    Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018)
  13. 13.
    Patil, A., Kshirsagar, D.: Towards feature selection for detection of DDoS attack. In: Computing in Engineering and Technology, pp. 215–223. Springer, Singapore (2020)
  14. 14.
    Shailesh, S.P., Raiwani, Y.P., Panwar, L.S.: Evaluation of network intrusion detection with features selection and machine learning algorithms on CICIDS-2017 dataset. Available at SSRN 3394103 (2019)
  15. 15.
    Frank, E., Witten, I.H.: Generating accurate rule sets without global optimization. In: Fifteenth International Conference on Machine Learning, pp. 144–151 (1998)
  16. 16.
    Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. In: ICISSP, pp. 108–116 (2018)

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  1. 1.Department of Computer Engineering & ITCollege of Engineering Pune (COEP)PuneIndia

Personalised recommendations