2021
DOI: 10.1007/978-981-16-3346-1_73
|View full text |Cite
|
Sign up to set email alerts
|

Recommendations for DDOS Attack-Based Intrusion Detection System Through Data Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
3
0
1
Order By: Relevance
“…The number of classes in the data set was 5, the number of attacks in the training data set was 21, and the number of attacks in the testing data set was 37 [4,20]; this represents that the number of additional novel attacks in the testing data set was 16 [16,28]. There were about 41 attributes for each record of the data set; the comprehensive report of the attributes are mentioned in [13,15].…”
Section: Data Set Discussionmentioning
confidence: 99%
“…The number of classes in the data set was 5, the number of attacks in the training data set was 21, and the number of attacks in the testing data set was 37 [4,20]; this represents that the number of additional novel attacks in the testing data set was 16 [16,28]. There were about 41 attributes for each record of the data set; the comprehensive report of the attributes are mentioned in [13,15].…”
Section: Data Set Discussionmentioning
confidence: 99%
“…Other issues include the fact that most anomaly-based IDS lack high-quality datasets for analysis and that the error rate automatically rises when issues like redundancy arise. The most recent publicly accessible dataset, labelled flow data CIDDS-01 (Yin et al, 2017) (Ibrahim et al, 2013), is presented by Pande, Kamparia, and Gupta (2022). (Ibrahim et al, 2013).…”
Section: Related Workmentioning
confidence: 99%
“…All these models achieve very high accuracies and low false-positive rates, which are within the acceptable threshold, thus qualifying them as potential options for realworld implementations. Other strategies such as ensemble learning [51], dataset analysis based recommendations [31], feature extraction [20] and feature selection [2] (like stacked feature selection) [38] have also been successfully utilized to improve the performance of the models.…”
Section: Related Workmentioning
confidence: 99%