使用决策树算法检测DDoS攻击

S. Lakshminarasimman, S. Ruswin, K. Sundarakantham
{"title":"使用决策树算法检测DDoS攻击","authors":"S. Lakshminarasimman, S. Ruswin, K. Sundarakantham","doi":"10.1109/ICSCN.2017.8085703","DOIUrl":null,"url":null,"abstract":"The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.","PeriodicalId":383458,"journal":{"name":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":"{\"title\":\"Detecting DDoS attacks using decision tree algorithm\",\"authors\":\"S. Lakshminarasimman, S. Ruswin, K. Sundarakantham\",\"doi\":\"10.1109/ICSCN.2017.8085703\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.\",\"PeriodicalId\":383458,\"journal\":{\"name\":\"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"26\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCN.2017.8085703\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCN.2017.8085703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26

摘要

被称为IEEE 802.111的标准的广泛使用已经成为一种解决方案,以支持具有高带宽的积极网络覆盖,从而引发各种安全威胁。Wi-Fi(无线保真)的广泛使用使我们能够轻松访问互联网,也为许多黑客攻击的起源铺平了道路。异常检测应用于检测活动数据泄露是可能的,比如终端用户和管理层发现它反复试图理解分布式拒绝服务(DDoS)攻击。一种新的异常检测方法使用决策树程序来保护网络内的无线节点和目标节点免受DDoS攻击,并使用KDDCup'99数据集确定攻击模式并提供适当的反击步骤进行分类意图和确定,表明它以周感知率将实例分类为各自的攻击类型。这个漏洞集成了公认的分类能力是Random Forest和J48。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Detecting DDoS attacks using decision tree algorithm
The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches is possible on several things such as end user along with management discover it repeatedly trying to understanding with distributed denial of service (DDoS) attack. A new approach for anomaly detection using Decision Tree procedure to secure wireless nodes inside the network and destination nodes from DDoS attacks and to determinate the attack patterns and provide suitable counter steps using KDDCup'99 dataset for classification intention and determination indicated that it classifies instances into respective attack types with week sensing rate. This exploit integrates are well recognized classification proficiencies are Random Forest and J48.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信