An integrated approach explaining the detection of distributed denial of service attacks

被引:10
|
作者
Batchu, Raj Kumar [1 ]
Seetha, Hari [2 ]
机构
[1] VIT AP Univ, Sch Comp Sci & Engn Scope, Near Vijayawada, Amaravati, Andhra Pradesh, India
[2] VIT AP Univ, Ctr Excellence AI & Robot, Near Vijayawada, Amaravati, Andhra Pradesh, India
关键词
DDoS attacks; Data preprocessing; Feature selection; CICDDoS2019; dataset; SHAP; LIME; INTRUSION DETECTION; SELECTION;
D O I
10.1016/j.comnet.2022.109269
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, several machine learning and deep learning models have been designed to detect various DDoS attacks, but the presence of irrelevant features, lack of transparency and class imbalance make these models less efficient. In this paper, we developed a novel efficient model to address these issues in detecting DDOS attacks. To begin with, data preprocessing is performed to improve the quality of the training data. The minority class samples are then generated using the Adaptive Synthetic oversampling technique to overcome the class imbalance. Following that, feature selection is performed by embedding SHAP feature importance within recursive feature elimination with five base classifiers. In addition, the hyperparameter of these classifiers is tuned to determine the most contributed features. Furthermore, global and local explanations for extracted features are provided to ensure transparency. Finally, these features are fed to the dynamic ensemble selection techniques such as KNORA-E and KNORA-U for classification by varying k values. These evaluations are analyzed using the CICDDoS2019 dataset. The evaluations are carried out in balanced and imbalanced data scenarios. The results indicate that the balanced data scenario outperformed the imbalanced data scenario as well as existing approaches. An accuracy of 99.9878% using KNORA-E and 99.9886% using KNORA-U is obtained utilizing the five most contributed features.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Distributed denial of service attacks and detection mechanisms
    Rafsanjani, Marjan Kuchaki
    Kazeminejad, Neda
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2014, 14 (06) : 329 - 345
  • [2] Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach
    Samom, Premson Singh
    Taggu, Amar
    [J]. APPLIED SOFT COMPUTING AND COMMUNICATION NETWORKS, 2021, 187 : 75 - 87
  • [3] Denial of service and distributed denial of service attacks
    Piskozub, A
    [J]. MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS, 2002, : 303 - 304
  • [4] Distributed Detection and Response for the Mitigation of Distributed Denial of Service Attacks
    Grant, D. C.
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 495 - 497
  • [5] Detection and Prevention of Distributed Denial of Service Attacks in VANETs
    Shabbir, Munazza
    Khan, Muazzam A.
    Khan, Umair Shafiq
    Saqib, Nazar A.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE & COMPUTATIONAL INTELLIGENCE (CSCI), 2016, : 970 - 974
  • [6] A mechanism for detection and prevention of distributed denial of service attacks
    Sen, Jaydip
    Chowdhury, Piyali Roy
    Sengupta, Indranil
    [J]. DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 139 - 144
  • [7] A Novel Mechanism for Detection of Distributed Denial of Service Attacks
    Sen, Jaydip
    [J]. ADVANCED COMPUTING, PT III, 2011, 133 : 247 - 257
  • [8] A Review on Detection Approaches for Distributed Denial of Service Attacks
    Chaudhari, Rutika S.
    Talmale, G. R.
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, : 323 - 327
  • [9] Distributed denial of service attacks
    Lau, F
    Rubin, SH
    Smith, MH
    Trajkovic, L
    [J]. SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2275 - 2280
  • [10] An ensemble method for feature selection and an integrated approach for mitigation of distributed denial of service attacks
    Chanu, Usham Sanjota
    Singh, Khundrakpam Johnson
    Chanu, Yambem Jina
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (13):