2021
DOI: 10.1016/j.comnet.2021.108498
|View full text |Cite
|
Sign up to set email alerts
|

A generalized machine learning model for DDoS attacks detection using hybrid feature selection and hyperparameter tuning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Many intelligent machine learning algorithms have been developed to facilitate the detection of DDoS attacks. [71][72][73][74] Since a DDoS attack has two attributes (attack and normal), we categorize it as a binary classification problem.…”
Section: Performance Evaluation With Machine Learning Modelsmentioning
confidence: 99%
“…Many intelligent machine learning algorithms have been developed to facilitate the detection of DDoS attacks. [71][72][73][74] Since a DDoS attack has two attributes (attack and normal), we categorize it as a binary classification problem.…”
Section: Performance Evaluation With Machine Learning Modelsmentioning
confidence: 99%
“…It should be noted that most of the proposed methods have only included CIC-IDS2017 or CSE-CIC-IDS2018 in their analysis. Reference [13] included CIC-DoS2017 (besides IDS2017 and IDS2018), references [14] and [15] were validated on CIC-DDoS2019 and reference [16] included all four CIC datasets.…”
Section: B Proposed Ml-ids Detection and Feature Selection Systemsmentioning
confidence: 99%
“…CIC Collection (IDS17, IDS18, DoS17, DDoS19) [27] 2020 PSH flag count, fwd packet length min, bwd packet length min, down/up ratio [28] 2020 protocol, down/up ratio, active std [13] 2021 PSH flag count, active std [16] 2021 fwd packet length min, packet length min, PSH flag count, ACK flag count [14] 2021 protocol, bwd packet length min [15] 2021 packet length min, bwd packet length min [29] 2022 PSH flag count, packet length min, protocol, fwd packet length min, bwd packet length min active std, idle std, ACK flag count, ECE flag count, RST flag count, down/up ratio [33]) proposed for cyber security ML systems on six criteria. They conclude that white-box techniques (full model access) such as integrated gradients and layer-wise relevance propagation comply best with the tested criteria.…”
Section: Yearmentioning
confidence: 99%
“…Intruders skilfully reap the benefits of exploitable vulnerabilities in a variety of methods that are generally difficult to pinpoint due to technological advancements. Therefore, it’s important to identify current shortcomings, how they can be used by adversaries in the manufacturing environment, and most crucially the facts they are most keen on 5 . The greatest approach to understand how to defend something is to be aware of what is going on within, which argues for security observability.…”
Section: Introductionmentioning
confidence: 99%