2022 2nd International Conference on Intelligent Cybernetics Technology &Amp; Applications (ICICyTA) 2022
DOI: 10.1109/icicyta57421.2022.10038126
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Detection Using Information Gain Feature Selection and Random Forest Classifier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…In this section, we compare the results of our proposed method with other centralized methods, including NB [12], Supporting Vector Machine (SVM) [11], [77], RF [11], [13], [77], MLP [37], CNN [20], [21], [24] and transformer [33], [34] as shown in model. From these quantitative results, we can find that the traditional federated learning can obtain a model with average malicious traffic detection performance on different edge servers, but lose the personalized characteristics of the IoT devices traffic data on each edge server.…”
Section: Quantitative Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we compare the results of our proposed method with other centralized methods, including NB [12], Supporting Vector Machine (SVM) [11], [77], RF [11], [13], [77], MLP [37], CNN [20], [21], [24] and transformer [33], [34] as shown in model. From these quantitative results, we can find that the traditional federated learning can obtain a model with average malicious traffic detection performance on different edge servers, but lose the personalized characteristics of the IoT devices traffic data on each edge server.…”
Section: Quantitative Resultsmentioning
confidence: 99%
“…Shafiq et al [11] proposed a TOPSIS and Shannon entropy based feature selection algorithm named CorrAUC and employed four ML methods to detect malicious BoT-IoT traffic. Mandala et al [12], [13] used information gain to select features that have a large influence on determining whether a traffic flow is malicious or not and then employed Naïve Bayes (NB) and Random Forest (RF) to detect DDoS attacks respectively. Kamaldeep et al [19] proposed a novel IoT cross-layer intrusion detection dataset, IoT-CIDDS, and conducted a detailed and comprehensive analysis of the dataset using feature engineering and five machine learning algorithms.…”
Section: A Malicious Traffic Detectionmentioning
confidence: 99%
See 1 more Smart Citation