使用决策树算法检测DDoS攻击

S. Lakshminarasimman, S. Ruswin, K. Sundarakantham
{"title":"使用决策树算法检测DDoS攻击","authors":"S. Lakshminarasimman, S. Ruswin, K. Sundarakantham","doi":"10.1109/ICSCN.2017.8085703","DOIUrl":null,"url":null,"abstract":"The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":"{\"title\":\"Detecting DDoS attacks using decision tree algorithm\",\"authors\":\"S. Lakshminarasimman, S. Ruswin, K. Sundarakantham\",\"doi\":\"10.1109/ICSCN.2017.8085703\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.\",\"PeriodicalId\":383458,\"journal\":{\"name\":\"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"26\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCN.2017.8085703\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCN.2017.8085703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26

摘要

被称为IEEE 802.111的标准的广泛使用已经成为一种解决方案,以支持具有高带宽的积极网络覆盖,从而引发各种安全威胁。Wi-Fi(无线保真)的广泛使用使我们能够轻松访问互联网,也为许多黑客攻击的起源铺平了道路。异常检测应用于检测活动数据泄露是可能的,比如终端用户和管理层发现它反复试图理解分布式拒绝服务(DDoS)攻击。一种新的异常检测方法使用决策树程序来保护网络内的无线节点和目标节点免受DDoS攻击,并使用KDDCup'99数据集确定攻击模式并提供适当的反击步骤进行分类意图和确定,表明它以周感知率将实例分类为各自的攻击类型。这个漏洞集成了公认的分类能力是Random Forest和J48。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Detecting DDoS attacks using decision tree algorithm
The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design and implementation of programmable read only memory using reversible decoder on FPGA Literature survey on traffic-based server load balancing using SDN and open flow A survey on ARP cache poisoning and techniques for detection and mitigation Machine condition monitoring using audio signature analysis Robust audio watermarking for monitoring and information embedding
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1