Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method

被引:70
作者
Alduailij, Mona [1 ]
Khan, Qazi Waqas [2 ]
Tahir, Muhammad [2 ]
Sardaraz, Muhammad [2 ]
Alduailij, Mai [1 ]
Malik, Fazila [2 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh 11671, Saudi Arabia
[2] COMSATS Univ Islamabad, Dept Comp Sci, Attock Campus, Attock 43600, Pakistan
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 06期
关键词
machine learning; mutual information; random forest; DDoS; cloud computing; FEATURE REDUCTION METHOD; INTRUSION DETECTION; NEURAL-NETWORK;
D O I
10.3390/sym14061095
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing facilitates the users with on-demand services over the Internet. The services are accessible from anywhere at any time. Despite the valuable services, the paradigm is, also, prone to security issues. A Distributed Denial of Service (DDoS) attack affects the availability of cloud services and causes security threats to cloud computing. Detection of DDoS attacks is necessary for the availability of services for legitimate users. The topic has been studied by many researchers, with better accuracy for different datasets. This article presents a method for DDoS attack detection in cloud computing. The primary objective of this article is to reduce misclassification error in DDoS detection. In the proposed work, we select the most relevant features, by applying two feature selection techniques, i.e., the Mutual Information (MI) and Random Forest Feature Importance (RFFI) methods. Random Forest (RF), Gradient Boosting (GB), Weighted Voting Ensemble (WVE), K Nearest Neighbor (KNN), and Logistic Regression (LR) are applied to selected features. The experimental results show that the accuracy of RF, GB, WVE, and KNN with 19 features is 0.99. To further study these methods, misclassifications of the methods are analyzed, which lead to more accurate measurements. Extensive experiments conclude that the RF performed well in DDoS attack detection and misclassified only one attack as normal. Comparative results are presented to validate the proposed method.
引用
收藏
页数:15
相关论文
共 56 条
[1]   Feature selection using principal component analysis and genetic algorithm [J].
Adhao, Rahul ;
Pachghare, Vinod .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2020, 23 (02) :595-602
[2]   Automated DDOS attack detection in software defined networking [J].
Ahuja, Nisha ;
Singal, Gaurav ;
Mukhopadhyay, Debajyoti ;
Kumar, Neeraj .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 187 (187)
[3]  
Aljamal I, 2019, 2019 IEEE/ACIS 17TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA), P84, DOI [10.1109/sera.2019.8886794, 10.1109/SERA.2019.8886794]
[4]  
[Anonymous], DDoS Evaluation Dataset," Data Sheet DDoS2019
[5]  
[Anonymous], Intrusion detection system
[6]  
[Anonymous], CTU 13 DATASET LABEL
[7]  
[Anonymous], U CALIFORNIA DEP INF
[8]  
[Anonymous], CANADIAN I CYBERSECU
[9]  
[Anonymous], ISOT RES LAB BOTNET
[10]   Developing new deep-learning model to enhance network intrusion classification [J].
Azzaoui, Hanane ;
Boukhamla, Akram Zine Eddine ;
Arroyo, David ;
Bensayah, Abdallah .
EVOLVING SYSTEMS, 2022, 13 (01) :17-25