Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing

被引:36
作者
Khan, Suleman [1 ]
Gani, Abdullah [2 ]
Wahab, Ainuddin Wahid Abdul [2 ]
Singh, Prem Kumar [3 ]
机构
[1] Monash Univ Malaysia, Sch Informat Technol, Subang Jaya, Selangor Darul, Malaysia
[2] Univ Malaya, Ctr Mobile Cloud Comp Res C4MCCR, Kuala Lumpur, Malaysia
[3] Amity Univ, Amity Inst Informat Technol, Noida, India
关键词
Intrusion detection systems; DoS attack; Entropy; SHANNON ENTROPY; INFORMATION;
D O I
10.1007/s13369-017-2634-8
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Recently, many researchers have paid attention toward denial of services (DoS) and its malicious handling. The Intrusion detection system is one of the most common detection techniques used to detect malicious attack which attempts to compromise the security goals. To deal with such an issue, some of the researchers have used entropy calculation recently to detect malicious attacks. However, it fails to identify the most potential feature for DoS attack which needs to be addressed on its early occurrence. Therefore, this paper focused on identifying some of the potential attributes of a DoS attack based on computed weight for each of the attributes using entropy calculation. In addition, the selection of potential attributes based on user-defined chosen granulation is also given using NSL KDD dataset.
引用
收藏
页码:499 / 508
页数:10
相关论文
共 40 条
  • [1] [Anonymous], 2013, INT J COMPUTER SCI I
  • [2] [Anonymous], 2008, Handbook of Granular Computing
  • [3] Chhabra M., 2014, Res. J. Appl. Sci., Eng. Technol., V7, P2033
  • [4] Chhabra M., 2013, J INF SECUR, V4, P153
  • [5] Statistical approaches to DDoS attack detection and response
    Feinstein, L
    Schnackenberg, D
    Balupari, R
    Kindred, D
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 303 - 314
  • [6] Gupta, 2011, INTRO DDOS ATTACKS D
  • [7] Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
    Gupta, B. B.
    Badve, Omkar P.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2017, 28 (12) : 3655 - 3682
  • [8] Gupta B. B., 2008, 16 IEEE INT C NETW 2
  • [9] Research of Clustering Algorithm based on Information Entropy and Frequency Sensitive Discrepancy Metric in Anomaly Detection
    Li, Han
    Wu, Qiuxin
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 799 - 805
  • [10] INST. OF MED. & NAT'L RESEARCH COUNCIL, 2014, HEAR LOSS HLTH AG WO, p[31, 31]