2021
DOI: 10.14569/ijacsa.2021.0120517
|View full text |Cite
|
Sign up to set email alerts
|

Predicting DOS-DDOS Attacks: Review and Evaluation Study of Feature Selection Methods based on Wrapper Process

Abstract: Now-a-days, Cybersecurity attacks are becoming increasingly sophisticated and presenting a growing threat to individuals, private and public sectors, especially the Denial Of Service attack (DOS) and its variant Distributed Denial Of Service (DDOS). Dealing with these dangerous threats by using traditional mitigation solutions suffers from several limits and performance issues. To overcome these limitations, Machine Learning (ML) has become one of the key techniques to enrich, complement and enhance the tradit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 60 publications
0
8
0
Order By: Relevance
“…For implementation, each module was embedded into the main model as a black box with its default parameters. See [ 67 , 68 , 69 , 70 , 71 , 72 , 73 ] for more details about the mentioned metaheuristic optimization techniques and their default parameters. As revealed in Table 5 , both GA and ACO have gained better classification accuracy than other algorithms.…”
Section: Resultsmentioning
confidence: 99%
“…For implementation, each module was embedded into the main model as a black box with its default parameters. See [ 67 , 68 , 69 , 70 , 71 , 72 , 73 ] for more details about the mentioned metaheuristic optimization techniques and their default parameters. As revealed in Table 5 , both GA and ACO have gained better classification accuracy than other algorithms.…”
Section: Resultsmentioning
confidence: 99%
“…The process of data sampling involves creating a data set by adjusting the number of samples of the majority class in the unbalanced data set and it occupies the largest part while the minority class occupies the smallest part. The sampling method is classified as a reduction or oversampling method, depending on which of the two categories is the number of samples [27].…”
Section: G Data Oversamplingmentioning
confidence: 99%
“…Table VII shows that there are 7 common features (i.e. 3,5,7,8,10,23,31) between the CICIDS2017 and CICIDS2018 in case of using the RF algorithm. However, the InSDN dataset has only 1 common feature (i.e.…”
Section: F Feature Selection Processmentioning
confidence: 99%
“…3, 8, 10, 22, 31), while they are combined on six features (i.e. 5, 7,8,10,21,31) in case of CICIDS2018. In a similar way, six features (i.e.…”
Section: F Feature Selection Processmentioning
confidence: 99%
See 1 more Smart Citation