Experiments on Detection of Denial of Service Attacks using REPTree

被引:0
|
作者
Katkar, Vijay D. [1 ]
Bhatia, Deepti S. [1 ]
机构
[1] Pimpri Chinchwad Coll Engn, Dept Informat Technol, Pune, Maharashtra, India
关键词
REPTree; Feature selection; Intrusion Detection System; Denial of Service Attack;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack, exhausts the resources of server/service and makes it unavailable for legitimate users. With increasing use of online services and attacks on these services, the importance of Intrusion Detection System (IDS) for detection of DoS/DDoS attacks has also grown. Different techniques such as data mining, neural network, genetic algorithms, pattern recognition are being used to design IDS. Tree based classifier is one of the widely used data mining technique for design of IDS. This paper evaluates variation in performance of REPTree classifier for intrusion detection when used in combination with different data pre-processing and feature selection methods. Experimental results prove that accuracy of REPTree classifier is improved and performs better than other tree based classifiers when used in combination with feature selection and data preprocessing methods.
引用
收藏
页码:713 / 718
页数:6
相关论文
共 50 条
  • [1] Experiments on Detection of Denial of Service Attacks using Ensemble of Classifiers
    Katkar, Vijay D.
    Kulkarni, Siddhant Vijay
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 837 - 842
  • [2] Experiments on Detection of Denial of Service Attacks using Naive Bayesian Classifier
    Katkar, Vijay D.
    Kulkarni, Siddhant Vijay
    [J]. 2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 725 - 730
  • [3] Detection of denial of service attacks using neural networks
    Bolanos, RF
    Cadena, CA
    Nino, F
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 84 - 87
  • [4] Detection of Denial-of-service Attacks
    Anh Quang Tran
    [J]. 计算机工程, 2002, (S1) : 86 - 91
  • [5] Detection of denial of service attacks using an artificial immune system
    Nino, F
    Vejar, RA
    Gómez, DJ
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 223 - 228
  • [6] Detection and Mitigation of Denial of Service Attacks Using Stratified Architecture
    Prakash, A.
    Satish, M.
    Bhargav, T. Sri Sai
    Bhalaji, N.
    [J]. FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 275 - 280
  • [7] Detection of Denial of Service Attacks Using Echo State Networks
    Bekshentayeva, Kamila
    Trajkovic, Ljiljana
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 1227 - 1232
  • [8] Detection of Denial of Service Attacks in Communication Networks
    Rios, Ana Laura Gonzalez
    Li, Zhida
    Bekshentayeva, Kamila
    Trajkovic, Ljiljana
    [J]. 2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [9] Distributed denial of service attacks and detection mechanisms
    Rafsanjani, Marjan Kuchaki
    Kazeminejad, Neda
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2014, 14 (06) : 329 - 345
  • [10] Distributed Denial of Service Attacks Detection Using Support Vector Machine
    Ahmad, Iftikhar
    Abdullah, Azween B.
    Alghamdi, Abdullah S.
    Hussain, Muhammad
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (01): : 127 - 134