2020 16th IEEE International Colloquium on Signal Processing &Amp; Its Applications (CSPA) 2020
DOI: 10.1109/cspa48992.2020.9068679
|View full text |Cite
|
Sign up to set email alerts
|

IDS for Improving DDoS Attack Recognition Based on Attack Profiles and Network Traffic Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 25 publications
1
7
0
Order By: Relevance
“…When A and B are distinct variables with ranges in a1....ak and b1....bk, the uncertainty about A's value is quantified by its entropy in Equation (2).…”
Section: Feature Range Using Igmentioning
confidence: 99%
See 1 more Smart Citation
“…When A and B are distinct variables with ranges in a1....ak and b1....bk, the uncertainty about A's value is quantified by its entropy in Equation (2).…”
Section: Feature Range Using Igmentioning
confidence: 99%
“…Figure 1: Basic flow of IDS Current IDS have several flaws; there are numerous IDS programs available on the market and on the internet, but the fact remains that they are not entirely capable of detecting all types of assaults [2]. The most widely used intrusion detection tool is Snort.…”
Section: Introductionmentioning
confidence: 99%
“…Decision tree learning is a target learning classifier and the most popular inference logical model. 76 It takes discrete values as target and threshold values, which is the base of classification. It starts with a root node and then with multiple nodes, where each respective node determines the value of the respective feature or attribute.…”
Section: Decision Tree Classifiermentioning
confidence: 99%
“…The entropy for every division against the feature is computed [22]. Finally, it is added correspondingly to become overall entropy.…”
Section: Entropy For Two Attributesmentioning
confidence: 99%
“…The tremendous volume of existing and recently appearing network data influenced researchers to use data mining technologies to investigate attacks [16,17,21,23,32]. Currently, various researchers are continuing to develop an effective IDS system for DDoS using a machine learning algorithm [1,3,6,8,12,19,22,30]. This is since data mining methods are suitable for extensive mining of collection of different patterns from a network traffic flow.…”
Section: Introductionmentioning
confidence: 99%