Feature Selection for Robust Backscatter DDoS Detection

被引:0
|
作者
Balkanli, Eray [1 ]
Zincir-Heywood, A. Nur [1 ]
Heywood, Malcolm I. [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
来源
2015 IEEE 40TH LOCAL COMPUTER NETWORKS CONFERENCE WORKSHOPS (LCN WORKSHOPS) | 2015年
关键词
DDoS; Backscatter; traffic analysis and classification;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper analyzes the effect of using different feature selection algorithms for robust backscatter DDoS detection. To achieve this, we analyzed four different training sets with four different feature sets. We employed two well-known feature selection algorithms, namely Chi-Square and Symmetrical Uncertainty, together with the Decision Tree classifier. All the datasets employed are publicly available and provided by CAIDA. Our experimental results show that it is possible to develop a robust detection system that can generalize well to the changing backscatter DDoS behaviours over time using a small number of selected features.
引用
收藏
页码:611 / 618
页数:8
相关论文
共 50 条
  • [31] A MSPCA based Intrusion Detection Algorithm for Detection of DDoS Attack
    Chen, Zhaomin
    Yeo, Chai Kiat
    Francis, Bu Sung Lee
    Lau, Chiew Tong
    2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [32] An Integrated Technology of Ionospheric Backscatter Detection and Oblique Detection
    Lou, Peng
    Guo, Lixin
    Feng, Jing
    Wei, Na
    IEEE ACCESS, 2021, 9 : 129718 - 129727
  • [33] Detection of DDOS Attacks in Cloud Computing Environment
    Hamdani, Farhaan Noor
    Siddiqui, Farheen
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 83 - 87
  • [34] Efficient and Secure Statistical DDoS Detection Scheme
    Majed, Hussein
    Noura, Hassan N.
    Salman, Ola
    Malli, Mohammad
    Chehab, Ali
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - DCNET, OPTICS, SIGMAP AND WINSYS (ICETE), VOL 2, 2020, : 153 - 161
  • [35] Detection And Countermeasures of DDoS Attacks in Cloud Computing
    Elsayed, Mahmoud Said
    Azer, Marianne A.
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 702 - 707
  • [36] An Efficient DDoS Detection with Bloom Filter in SDN
    Xiao, Peng
    Li, Zhiyang
    Qi, Heng
    Qu, Wenyu
    Yu, Haisheng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1 - 6
  • [37] The Current Trends of DDoS Detection in SDN Environment
    Kareem, Mohammed Ibrahim
    Jasim, Mandi Nsaif
    PROCEEDING OF 2021 2ND INFORMATION TECHNOLOGY TO ENHANCE E-LEARNING AND OTHER APPLICATION (IT-ELA 2021), 2021, : 29 - 34
  • [38] A Rule Based DDoS Detection and Mitigation Technique
    Khamruddin, A. Md.
    Rupa, B. Dr Ch.
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [39] Traffic Anomaly Detection in DDos Flooding Attack
    Purwanto, Yudha
    Hendrawan, Kuspriyanto
    Rahardjo, Budi
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [40] An Outlier Detection Based DDoS Defense Method
    Wang, Dongqi
    Zhu Yufu
    Chang Guiran
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 511 - 514