TCP/UDP-Based Exploitation DDoS Attacks Detection Using AI Classification Algorithms with Common Uncorrelated Feature Subset Selected by Pearson, Spearman and Kendall Correlation Methods
نویسندگان
چکیده
The Distributed Denial of Service (DDoS) attack is a serious cyber security that attempts to disrupt the availability principle computer networks and information systems. It's critical detect DDoS attacks quickly accurately while using as less computing power possible in order minimize damage cost efficient. This research proposes fast high-accuracy detection approach by features selected proposed method for Exploitation-based attacks. Experiments are carried out on CICDDoS2019 datasets Syn flood, UDP UDP-Lag, well customized dataset. In addition, experiments were also conducted dataset was constructed combining three datasets. Pearson, Spearman, Kendall correlation techniques have been used find un-correlated feature subsets. Then, among subsets, choose common features. On datasets, classification applied these conventional classifiers Logistic regression, Decision tree, KNN, Naive Bayes, bagging classifier Random forest, boosting Ada boost, Gradient neural network-based Multilayer perceptron. performance algorithms evaluated terms accuracy, precision, recall, F1-score, specificity, log loss, execution time, K-fold cross-validation. Finally, tested with all dataset’s sets.
منابع مشابه
Influence functions of the Spearman and Kendall correlation measures
Nonparametric correlation estimators as the Kendall and Spearman correlation are widely used in the applied sciences. They are often said to be robust, in the sense of being resistant to outlying observations. In this paper we formally study their robustness by means of their influence functions and gross-error sensitivities. Since robustness of an estimator often comes at the price of an incre...
متن کاملFeature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کاملEvading DDoS detection with mimicry attacks
Distributed Denial of Service (DDoS) attacks are security attacks that prevent normal use of communication facilities. More and more DDoS attacks are occurring each day. Conventional DDoS attacks are typically based on flooding the server. Currently, other types of DDoS attacks have been observed, such as the mimicry DDoS attack. The mimicry attack is characterized by (1) gradual increase in th...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملToward Optimal Feature Selection Using Ranking Methods and Classification Algorithms
We presented a comparison between several feature ranking methods used on two real datasets. We considered six ranking methods that can be divided into two broad categories: statistical and entropy-based. Four supervised learning algorithms are adopted to build models, namely, IB1, Naive Bayes, C4.5 decision tree and the RBF network. We showed that the selection of ranking methods could be impo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Revue d'intelligence artificielle
سال: 2022
ISSN: ['1958-5748', '0992-499X']
DOI: https://doi.org/10.18280/ria.360107