2017
DOI: 10.5121/ijnsa.2017.9102
|View full text |Cite
|
Sign up to set email alerts
|

Application-Layer DDOS Detection Based on a One-Class Support Vector Machine

Abstract: Application-layer Distributed Denial-of-Service (DDoS) attack takes advantage of the complexity and diversity of network protocols and services. This kind of attacks is more difficult to prevent than other kinds of DDoS attacks. This paper introduces a novel detection mechanism for application-layer DDoS attack based on a One-Class Support Vector Machine (OC-SVM). Support vector machine (SVM) is a relatively new machine learning technique based on statistics. OC-SVM is a special variant of the SVM and since on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…When comparing the performance of our E2G with papers that cite and use the N-BaIoT dataset, our RF and DT E2G models outperformed the models in articles from [25]- [29] by showing close to 100% detection rates. Next, when compared with the standard host-based [18]- [20] and networkdeployed [21]- [23] approaches (from Section II-C), users can benefit more when they use our E2G models because of their standalone, offline attack detection capabilities that protect devices even when connected to dubious networks by mistake.…”
Section: F Comparing E2g Results With Other Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…When comparing the performance of our E2G with papers that cite and use the N-BaIoT dataset, our RF and DT E2G models outperformed the models in articles from [25]- [29] by showing close to 100% detection rates. Next, when compared with the standard host-based [18]- [20] and networkdeployed [21]- [23] approaches (from Section II-C), users can benefit more when they use our E2G models because of their standalone, offline attack detection capabilities that protect devices even when connected to dubious networks by mistake.…”
Section: F Comparing E2g Results With Other Methodsmentioning
confidence: 99%
“…A wide variety of ML algorithms are available to detect attacks in IoT environments. Article [25] presents an OC-SVM detection mechanism for application-layer DDoS attacks. Honeypots [26] detect botnet DDoS attacks by capturing device malware installation attempts using unsupervised methods.…”
Section: ML Techniques To Detect Botnetsmentioning
confidence: 99%