Denial-of-Service Attack Detection over IPv6 Network Based on KNN Algorithm

被引:18
作者
Alharbi, Yasser [1 ]
Alferaidi, Ali [1 ]
Yadav, Kusum [1 ]
Dhiman, Gaurav [2 ]
Kautish, Sandeep [3 ]
机构
[1] Univ Hail, Coll Comp Sci & Engn, Hail, Saudi Arabia
[2] Govt Bikram Coll Commerce, Dept Comp Sci, Patiala 147001, Punjab, India
[3] LBEF Campus, Kathmandu, Nepal
关键词
Internet protocols - Learning algorithms - Network security - Machine learning - Intrusion detection;
D O I
10.1155/2021/8000869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid increase and complexity of IPv6 network traffic, the traditional intrusion detection system Snort detects DoS attacks based on specific rules, which reduces the detection performance of IDS. To solve the DoS intrusion detection problem in the IPv6 network environment, the lightweight KNN optimization algorithm in machine learning is adopted. First, the double dimensionality reduction of features is achieved through the information gain rate, and discrete features with more subfeatures are selected and aggregated to further dimensionality reduction and feature dimension of the actual operation. Secondly, the information gain rate is used as the weight to optimize the sample Euclidean distance measurement. Based on the proposed measure of the reverse distance influence, the classification decision algorithm of the KNN algorithm is optimized to make the detection technology better. The effect is further improved. The experimental results show that the traditional TAD-KNN algorithm based on average distance and the GR-KNN algorithm that only optimizes the distance definition, the GR-AD-KNN algorithm can not only improve the overall detection performance in the detection of IPv6 network traffic characteristics but also for small groups of samples. As a result, classification has better detection results.
引用
收藏
页数:6
相关论文
共 31 条
[1]   Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network [J].
Al-Ani, Ahmed K. ;
Anbar, Mohammed ;
Al-Ani, Ayman ;
Ibrahim, Dyala R. .
IEEE ACCESS, 2020, 8 :27122-27138
[2]  
Alieksieiev Vladyslav, 2019, 2019 IEEE 14th International Conference on Computer Sciences and Information Technologies (CSIT), P268, DOI 10.1109/STC-CSIT.2019.8929812
[3]  
Altaher A., 2011, Proceedings of the 2011 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), P168, DOI 10.1109/ICCSCE.2011.6190516
[4]  
[Anonymous], 2008, 1 INT C DISTRIBUTED, DOI DOI 10.1109/ICDFMA.2008.4784430
[5]   Flow-Based Approach to Detect Abnormal Behavior in Neighbor Discovery Protocol (NDP) [J].
Bahashwan, Abdullah Ahmed ;
Anbar, Mohammed ;
Hasbullah, Iznan Husainy ;
Alashhab, Ziyad R. ;
Bin-Salem, Ali .
IEEE ACCESS, 2021, 9 :45512-45526
[6]  
Chatterjee I., 2021, INT J MODERN RES, V1, P15, DOI DOI 10.1093/OSO/9780198870944.003.0006
[7]  
Chen L., 2021, COMPUT COMMUN, V178, P297, DOI DOI 10.1016/J.COMCOM.2021.08.022
[8]   Absorption, metabolism and bioavailability of flavonoids: a review [J].
Chen, Lei ;
Cao, Hui ;
Huang, Qun ;
Xiao, Jianbo ;
Teng, Hui .
CRITICAL REVIEWS IN FOOD SCIENCE AND NUTRITION, 2022, 62 (28) :7730-7742
[9]   Emperor penguin optimizer: A bio-inspired algorithm for engineering problems [J].
Dhiman, Gaurav ;
Kumar, Vijay .
KNOWLEDGE-BASED SYSTEMS, 2018, 159 :20-50
[10]   Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications [J].
Dhiman, Gaurav ;
Kumar, Vijay .
ADVANCES IN ENGINEERING SOFTWARE, 2017, 114 :48-70