2021
DOI: 10.1088/1742-6596/1804/1/012136
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Denial of Service Attacks Detection System by Machine Learning Based on Dimensionality Reduction

Abstract: Data mining algorithms have essential methods and rules that can contribute in detecting and preventing various types of network attacks. These methods are utilized with the intrusion detection systems that can be designed and developed preserve the information in organizations from damage. Specifically, the data mining technique allows users to effectively distinguish between normal and malicious traffic with good accuracy. In this paper, a methodology for revealing and detecting (DDOS) network attack was sug… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…The amount of work that will be assigned to a server depends on the ability of that server to process and on the amount of data that can reach it [14]. For example, a server can handle 2 megabytes per second, but the amount of data owing to it does not exceed one megabyte per second, this means that the server will operate at half its capacity, On the other hand, it cannot handle a data stream of more than 2 megabytes as a maximum.…”
Section: A Proposed Ideamentioning
confidence: 99%
See 1 more Smart Citation
“…The amount of work that will be assigned to a server depends on the ability of that server to process and on the amount of data that can reach it [14]. For example, a server can handle 2 megabytes per second, but the amount of data owing to it does not exceed one megabyte per second, this means that the server will operate at half its capacity, On the other hand, it cannot handle a data stream of more than 2 megabytes as a maximum.…”
Section: A Proposed Ideamentioning
confidence: 99%
“…. Security Features: Servers may have different security measures implemented, which can affect their vulnerability to attacks and their ability to protect data [14].…”
Section: Power and Coolingmentioning
confidence: 99%
“…The authors 14–16 explored the applicability of neural networks and deep learning in detecting DDoS attacks. A number of datasets and combination of datasets are available which are near real‐time traffic patterns used for training these models 17,18 . The feature selection remains one of well sought research problem and the main crux to determine the efficiency of the trained models 19 .…”
Section: Literature Reviewmentioning
confidence: 99%
“…A number of datasets and combination of datasets are available which are near real-time traffic patterns used for training these models. 17,18 The feature selection remains one of well sought research problem and the main crux to determine the efficiency of the trained models. 19 In machine learning, also the high dimensionality with respect to number of features is increasing day by day with most of the datasets being unbalanced.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The utilization of computing enables organizations to integrate geographically dispersed resources from different administrative regions into a unified system. This consolidation facilitates the resolution of large-scale problems across scientific, human, and social domains [1]- [5]. These resources encompass diverse components such as computers, storage, peripherals, and applications.…”
Section: Introductionmentioning
confidence: 99%