2019
DOI: 10.1007/s12065-019-00310-w
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of Botnet DDoS attack detection using machine learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
59
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 148 publications
(59 citation statements)
references
References 36 publications
0
59
0
Order By: Relevance
“…The visual results obtained with this algorithm were discussed and detailed information about the characteristics of each attack type was given. Unlike the studies in the literature [36][37][38], defining the type of attack and determining its characteristic features have been focused on.…”
Section: Discussionmentioning
confidence: 99%
“…The visual results obtained with this algorithm were discussed and detailed information about the characteristics of each attack type was given. Unlike the studies in the literature [36][37][38], defining the type of attack and determining its characteristic features have been focused on.…”
Section: Discussionmentioning
confidence: 99%
“…Besides using random forest, Reference [126] found Support Vector Machine (SVM), Naive Bayes (NB), K-Nearest Neighbour and Linear Regression algorithms to be possible detection mechanisms. Furthermore, Reference [109] conducted an analysis of various machine learning algorithms for botnet DDoS attack detection, including SVM, ANN, NB, Decision Tree (DT) and USML. According to [109], when considering only DDoS attacks, Unsupervised Learning (USML) stands out as the better option to differentiate between botnet traffic and legitimate network traffic.…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 99%
“…Furthermore, Reference [109] conducted an analysis of various machine learning algorithms for botnet DDoS attack detection, including SVM, ANN, NB, Decision Tree (DT) and USML. According to [109], when considering only DDoS attacks, Unsupervised Learning (USML) stands out as the better option to differentiate between botnet traffic and legitimate network traffic.…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 99%
“…Similarly, deep learning methods lack the optimization perspective that leads to low generality of the model. Researchers are now able to develop high-detection detectors for fixed botnet data sets with binary recognition tasks [25]. However, since botnet attack detection techniques are constantly changing, a high detection rate for only fixed data sets cannot guarantee excellent accuracy when dealing with complex traffic data.…”
Section: Introductionmentioning
confidence: 99%