H. M. T. Gadiyar, Thyagaraju G S, V. Shibu, Seemitha .
{"title":"Mechanism to Detect the Suspicious Activity in the Network using Random Forest Algorithm","authors":"H. M. T. Gadiyar, Thyagaraju G S, V. Shibu, Seemitha .","doi":"10.48001/jocnv.2023.114-7","DOIUrl":null,"url":null,"abstract":"Due to new technology, cyberattacks and network-related assaults have dramatically grown. The Distributed Denial of Service (DDoS) attack, in which the hacker uses several dispersed resources against the targeted system, is one of the main risks in these attacks. As DDoS traffic looks just like regular traffic, it is difficult to identify DDoS attacks. We employ the machine learning technology known as the Random Forest Tree to identify the DDoS assault and categorize regular traffic from abnormal traffic. In this work, the dataset including all the properties of the incoming traffic is used to retrieve the incoming traffic. To create an appropriate model, the dataset is trained using the Random Forest technique. Each time the incoming traffic is given into this model as its input, it is then utilized to distinguish between the regular traffic and aberrant traffic.","PeriodicalId":402315,"journal":{"name":"Journal of Computer Networks and Virtualization","volume":"156 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Networks and Virtualization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.48001/jocnv.2023.114-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Due to new technology, cyberattacks and network-related assaults have dramatically grown. The Distributed Denial of Service (DDoS) attack, in which the hacker uses several dispersed resources against the targeted system, is one of the main risks in these attacks. As DDoS traffic looks just like regular traffic, it is difficult to identify DDoS attacks. We employ the machine learning technology known as the Random Forest Tree to identify the DDoS assault and categorize regular traffic from abnormal traffic. In this work, the dataset including all the properties of the incoming traffic is used to retrieve the incoming traffic. To create an appropriate model, the dataset is trained using the Random Forest technique. Each time the incoming traffic is given into this model as its input, it is then utilized to distinguish between the regular traffic and aberrant traffic.