H. M. T. Gadiyar, Thyagaraju G S, V. Shibu, Seemitha .
{"title":"基于随机森林算法的网络可疑活动检测机制","authors":"H. M. T. Gadiyar, Thyagaraju G S, V. Shibu, Seemitha .","doi":"10.48001/jocnv.2023.114-7","DOIUrl":null,"url":null,"abstract":"Due to new technology, cyberattacks and network-related assaults have dramatically grown. The Distributed Denial of Service (DDoS) attack, in which the hacker uses several dispersed resources against the targeted system, is one of the main risks in these attacks. As DDoS traffic looks just like regular traffic, it is difficult to identify DDoS attacks. We employ the machine learning technology known as the Random Forest Tree to identify the DDoS assault and categorize regular traffic from abnormal traffic. In this work, the dataset including all the properties of the incoming traffic is used to retrieve the incoming traffic. To create an appropriate model, the dataset is trained using the Random Forest technique. Each time the incoming traffic is given into this model as its input, it is then utilized to distinguish between the regular traffic and aberrant traffic.","PeriodicalId":402315,"journal":{"name":"Journal of Computer Networks and Virtualization","volume":"156 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mechanism to Detect the Suspicious Activity in the Network using Random Forest Algorithm\",\"authors\":\"H. M. T. Gadiyar, Thyagaraju G S, V. Shibu, Seemitha .\",\"doi\":\"10.48001/jocnv.2023.114-7\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to new technology, cyberattacks and network-related assaults have dramatically grown. The Distributed Denial of Service (DDoS) attack, in which the hacker uses several dispersed resources against the targeted system, is one of the main risks in these attacks. As DDoS traffic looks just like regular traffic, it is difficult to identify DDoS attacks. We employ the machine learning technology known as the Random Forest Tree to identify the DDoS assault and categorize regular traffic from abnormal traffic. In this work, the dataset including all the properties of the incoming traffic is used to retrieve the incoming traffic. To create an appropriate model, the dataset is trained using the Random Forest technique. Each time the incoming traffic is given into this model as its input, it is then utilized to distinguish between the regular traffic and aberrant traffic.\",\"PeriodicalId\":402315,\"journal\":{\"name\":\"Journal of Computer Networks and Virtualization\",\"volume\":\"156 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Networks and Virtualization\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.48001/jocnv.2023.114-7\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Networks and Virtualization","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.48001/jocnv.2023.114-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mechanism to Detect the Suspicious Activity in the Network using Random Forest Algorithm
Due to new technology, cyberattacks and network-related assaults have dramatically grown. The Distributed Denial of Service (DDoS) attack, in which the hacker uses several dispersed resources against the targeted system, is one of the main risks in these attacks. As DDoS traffic looks just like regular traffic, it is difficult to identify DDoS attacks. We employ the machine learning technology known as the Random Forest Tree to identify the DDoS assault and categorize regular traffic from abnormal traffic. In this work, the dataset including all the properties of the incoming traffic is used to retrieve the incoming traffic. To create an appropriate model, the dataset is trained using the Random Forest technique. Each time the incoming traffic is given into this model as its input, it is then utilized to distinguish between the regular traffic and aberrant traffic.