2014 International Symposium on Biometrics and Security Technologies (ISBAST) 2014
DOI: 10.1109/isbast.2014.7013133
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Denial of Service detection using hybrid machine learning technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(19 citation statements)
references
References 13 publications
0
17
0
2
Order By: Relevance
“…As it has been highlighted in [60,47,46,49,39,40,41], bio/nature-inspired algorithms have been used for feature reduction in an attempt to reduce the overall compexity of detection algorithms without affecting their accuracy. For finding an optimal set of features, we have used the available nature-inspired algorithms provided from Weka toolkit.…”
Section: Experiments Results Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…As it has been highlighted in [60,47,46,49,39,40,41], bio/nature-inspired algorithms have been used for feature reduction in an attempt to reduce the overall compexity of detection algorithms without affecting their accuracy. For finding an optimal set of features, we have used the available nature-inspired algorithms provided from Weka toolkit.…”
Section: Experiments Results Analysismentioning
confidence: 99%
“…Dr. 95% GA [37] KDD99 Attacks 90% GA [38] KDD99 Attacks 97.57% GA & FL [39] KDD99 Attacks 95% GA & FL [40] KDD99 Attacks 95% and 1% FPR GA & FL [41] KDD99 Attacks 99.75% FL [42] Jamming DoS 99.75% ACO [43] UDP DoS 80% ACO [44] Low-rate DoS 89% ACO [45] KDD99 Attacks 96.94% ABC & ANN [46] KDD99 Attacks less 0.025 squar er. GA & ANN [49] KDD99 Attacks 99.997% DR and 0.002% FPR ANN [50] KDD99 Attacks 99.723% DR and 0.277% FPR ANN [51] NSL-KDD Attacks 96.6% DR and 3.4% FPR ANN [52] KDD99 Attacks False Accept. less 8% & False Rej.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the study performed by Barati et al [15], by using a machine learning technique composed of genetic algorithm and artificial neural network, it is shown that the accuracy of DDoS attack detection is improved. Yu et al [16] guaranteed the quality of service for legitimate users by using a dynamic resource allocation strategy to confront DDoS attacks that target individual cloud customers.…”
Section: Literature Overviewmentioning
confidence: 99%
“…The work of Arun Raj Kumar and Selvakumar focuses on the identification of high rate flooding attack with high detection accuracy and fewer false alarms using adaptive and hybrid neuro-fuzzy systems with Adaptive Neuro-Fuzzy Systems (ANFIS) as a base classifier [10]. It is also worth noticing the improved performance of hybrid GA and ANN over GA and SVM [11], [12] and fusion IDS [13], [14] over individual IDSs.…”
Section: A Machine Learning Algorithms In Detecting Ddos Attacksmentioning
confidence: 99%