Deep learning based cyber bullying early detection using distributed denial of service flow

被引:0
作者
Muhammad Hassan Zaib
Faisal Bashir
Kashif Naseer Qureshi
Sumaira Kausar
Muhammad Rizwan
Gwanggil Jeon
机构
[1] Bahria University,Department of Computer Science
[2] Bahria University,Cyber Reconnaissance and Combat (CRC) Lab
[3] Incheon National University,Department of Embedded Systems Engineering
来源
Multimedia Systems | 2022年 / 28卷
关键词
Intrusion detection system; Deep learning; Flow-based data; Early detection; Computer security;
D O I
暂无
中图分类号
学科分类号
摘要
Cyber-bullying has been on the rise especially after the explosive widespread of various cyber-attacks. Various types of techniques have been used to tackle cyber-bullying. These techniques focused primarily on data traffic for monitoring malicious activities. This research proposes a methodology where we can detect early Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks. First, we formulate the problem in a practical scenario by comparing flow and non-flow-based datasets using Mann Whitney U statistical test. Flow and non-flow-based datasets and Artificial Neural Network (ANN) and Support Vector Machine (SVM) is used for classification. To keep original features, we use variance, correlation, ¾ quartile method to eliminate the unimportant features. The forward selection wrapper method for feature selection is used to find out the best features. To validate the proposed methodology, we take multiple DoS and DDoS single flow and validate it on 10%, 20%, 30%, 40%, and 50%. For validation, the experimental results show + 90% accuracy on the early 10% flow.
引用
收藏
页码:1905 / 1924
页数:19
相关论文
共 108 条
[1]  
Aliero MS(2020)An algorithm for detecting SQL injection vulnerability using black-box testing J Ambient Intell Humaniz Comput 11 249-266
[2]  
Ghani I(2020)Systematic review analysis on SQLIA detection and prevention approaches Wirel Pers Commun 112 2297-2333
[3]  
Qureshi KN(2013)Internet of things (IoT): a vision, architectural elements, and future directions Fut. Gener. Comput. Syst. 29 1645-1660
[4]  
Rohani MFA(2015)A survey of data mining and machine learning methods for cyber security intrusion detection IEEE Commun. Surv. Tutor. 18 1153-1176
[5]  
Aliero MS(1984)A note on denial-of-service in operating systems IEEE Trans. Softw. Eng. 3 320-324
[6]  
Qureshi KN(2004)A taxonomy of DDoS attack and DDoS defense mechanisms ACM SIGCOMM Comput. Commun. Rev. 34 39-53
[7]  
Pasha MF(2009)Anomaly-based network intrusion detection: techniques, systems and challenges Comput Secur 28 18-28
[8]  
Ghani I(2016)Support vector machines Stata J. 16 917-937
[9]  
Yauri RA(2016)Comparative study of K-NN, naive Bayes and decision tree classification techniques Int. J. Sci. Res. (IJSR) 5 1842-1845
[10]  
Gubbi J(1992)Multilayer perceptron, fuzzy sets, and classification IEEE Trans. Neural Netw. 3 683-697