An intelligent DDoS attack detection tree-based model using Gini index feature selection method

被引:29
作者
Bouke, Mohamed Aly [1 ]
Abdullah, Azizol [1 ]
ALshatebi, Sameer Hamoud [1 ]
Abdullah, Mohd Taufik [1 ]
El Atigh, Hayate [2 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Serdang 43400, Malaysia
[2] Bandirma Onyedi Eylul Univ, Fac Comp Engn, TR-10200 Balikesir, Turkiye
关键词
Feature importance; Decision trees; Gini index; DDoS; UNSW-NB15; DEEP LEARNING APPROACH; INTERNET; THINGS; PERFORMANCE; SYSTEMS;
D O I
10.1016/j.micpro.2023.104823
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber security has recently garnered enormous attention due to the popularity of the Internet of Things (IoT), intelligent devices' rapid growth, and a vast number of real-life applications. As a result, detecting threats and constructing an efficient Intrusion detection system (IDS) have become crucial in today's security requirements. Withal, the large amount of high dimensional data might influence detection effectiveness and raise the computation requirements. Artificial Intelligence (AI) has recently attracted much attention and is widely used to build intelligent IDSs to preserve data confidentiality, integrity, and availability. Distributed denial of service (DDoS) is a denial of service (DoS) variant mainly targeting asset availability. Preventing DoS at the network or infrastructure level typically depends on implementing an IDS. This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. Our approach is evaluated on the UNSW-NB15 dataset, which contains 1,140,045 samples and is more recent and comprehensive than those used in previous works. Our system achieved an overall accuracy of 98%, outperforming baseline models that used more advanced algorithms such as Random Forest and XGBoost. Our enhanced Gini index feature selection method allowed us to select only 13 out of 45 security features, signifi-cantly reducing the data dimensionality and avoiding overfitting issues. Our model also has a lower false alarm rate, misclassifying only 2% of the testing instances. Our approach is, therefore, highly effective and efficient, with the potential to be used in real-world network security applications.
引用
收藏
页数:10
相关论文
共 59 条
[1]   Machine Learning Classification of Port Scanning and DDoS Attacks: A Comparative Analysis [J].
Aamir, Muhammad ;
Rizvi, Syed Sajjad Hussain ;
Hashmani, Manzoor Ahmed ;
Zubair, Muhammad ;
Ahmad, Jawwad .
MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2021, 40 (01) :215-229
[2]   DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation [J].
Aamir, Muhammad ;
Zaidi, Syed Mustafa Ali .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) :761-785
[3]  
Abidin Dodo Zaenal, 2020, 2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), P284, DOI 10.1109/ICIMCIS51567.2020.9354273
[4]   An Intrusion Detection System for the Internet of Things Based on Machine Learning: Review and Challenges [J].
Adnan, Ahmed ;
Muhammed, Abdullah ;
Abd Ghani, Abdul Azim ;
Abdullah, Azizol ;
Hakim, Fahrul .
SYMMETRY-BASEL, 2021, 13 (06)
[5]   Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application [J].
Agarwal, Ankit ;
Khari, Manju ;
Singh, Rajiv .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) :419-439
[6]   Automated DDOS attack detection in software defined networking [J].
Ahuja, Nisha ;
Singal, Gaurav ;
Mukhopadhyay, Debajyoti ;
Kumar, Neeraj .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 187 (187)
[7]   A new DDoS attacks intrusion detection model based on deep learning for cybersecurity [J].
Akgun, Devrim ;
Hizal, Selman ;
Cavusoglu, Unal .
COMPUTERS & SECURITY, 2022, 118
[8]   An Intelligent Tree-Based Intrusion Detection Model for Cyber Security [J].
Al-Omari, Mohammad ;
Rawashdeh, Majdi ;
Qutaishat, Fadi ;
Alshira'H, Mohammad ;
Ababneh, Nedal .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (02)
[9]  
[Anonymous], 2017, INT J COMPUTER NETWO
[10]  
[Anonymous], 1999, Data Preparation for Data Mining