2021
DOI: 10.1007/s12652-021-02907-5
|View full text |Cite
|
Sign up to set email alerts
|

A feature reduction based reflected and exploited DDoS attacks detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 51 publications
(16 citation statements)
references
References 40 publications
0
16
0
Order By: Relevance
“…Therefore, this type of system fails to recognize a low-volume of DDoS attacks. Few authors [55] designed there system using recent dataset. Therefore, there is a need for a new classification approach that can be validated using recent datasets, such as CICDDoS2019.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, this type of system fails to recognize a low-volume of DDoS attacks. Few authors [55] designed there system using recent dataset. Therefore, there is a need for a new classification approach that can be validated using recent datasets, such as CICDDoS2019.…”
Section: Related Workmentioning
confidence: 99%
“…Selvakumar et al [34] combined filtered and wrapped methods on the KDD Cup99 dataset and finally used the selected 10 features to improve the detection performance while reducing the computation time. Kshirsagar et al [35] combined information gain and correlation by selecting 0, 0.25, and 0.5 thresholds, union features greater than 0.5, intersecting features between 0.25 and 0.5, removing features less than 0.25, and finally merging to obtain the selected subset. Krishnaveni et al [21] used a univariate integrated feature selection technique combined with the majority voting for validation on the NSL-KDD dataset, based on 10-100% of the different proportions selected for the experiment, and the accuracy and stability were improved.…”
Section: Related Workmentioning
confidence: 99%
“…It is also evident that the designed feature selection approach is critical for increasing the efficiency of large data detection. In previous problems of selecting the number of subsets for features, in the face of filtered and embedded methods, many used artificially set ratios to select features or those based on fixed thresholds [18,20,[33][34][35][36][37]. Such methods are significantly subjective and require empirical knowledge, and they do not adequately consider the applicability to different scenarios.…”
Section: Automatic Feature Selection Performance Analysismentioning
confidence: 99%
“…Simple Service Discovery Protocol (SSDP) [2] amplification floods can be sent to a target system using Universal Plug and Play (UPnP) devices which can access the network devices. Microsoft SQL (MSSQL) [3] Server Resolution protocol is used for database instance enumeration service. The service is vulnerable to reflection-based DDoS attacks.…”
Section: Reflection-based Ddos Attacksmentioning
confidence: 99%