Feature Selection using Information Gain Method for Building Classification Model DDoS Attack at Application Layer
How to cite (IJASEIT) :
C. Douligeris and D. N. Serpanos, Network security Current Status and Future Direcetions. 2007.
J. Bradshaw, “HSBC online banking crashes after cyber attack,” The Telegraph web, 2016. [Online]. Available: https://www.telegraph.co.uk/finance/newsbysector/banksandfinance/12129411/HSBC-online-banking-service-crashes-again.html.
A. Kharpal, “Hack attack leaves 1,400 airline passengers grounded,” CNBC Web, 2015. [Online]. Available: https://www.cnbc.com/2015/06/22/hack-attack-leaves-1400-passengers-of-polish-airline-lot-grounded.html.
O. Kupreev, E. Badovskaya, and A. Gutnikov, “DDoS attacks in Q3 2018,” Securelist, 2018. [Online]. Available: https://securelist.com/ddos-report-in-q3-2018/88617/.
B. Nagpal, P. Sharma, N. Chauhan, and A. Panesar, “DDoS tools: Classification, analysis and comparison,” 2015 Int. Conf. Comput. Sustain. Glob. Dev. INDIACom 2015, pp. 342-346, 2015.
Verisign, “Verisign Distributed Denial of Service Report,” 2018.
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, “DDoS-shield: DDoS-resilient scheduling to counter application layer attacks,” IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 26-39, 2009.
K. J. Singh and T. De, “MLP-GA based algorithm to detect application layer DDoS attack,” J. Inf. Secur. Appl., vol. 36, pp. 145-153, 2017.
I. Ko, D. Chambers, and E. Barrett, “Self-supervised network traffic management for DDoS mitigation within the ISP domain,” Futur. Gener. Comput. Syst., vol. 112, pp. 524-533, 2020.
V. Bolón-Canedo, N. Sí¡nchez-Maroño, and A. Alonso-Betanzos, “Feature selection and classification in multiple class datasets: An application to KDD Cup 99 dataset,” Expert Syst. Appl., vol. 38, no. 5, pp. 5947-5957, 2011.
O. Osanaiye, H. Cai, K. K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016.
K. Kumar, G. Kumar, and Y. Kumar”, “Feature Selection Approach for Intrusion Detection System”,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 2, no. 5, pp. 47-53, 2013.
M. Wang, Y. Lu, and J. Qin, “A dynamic MLP-based DDoS attack detection method using feature selection and feedback,” Comput. Secur., vol. 88, 2020.
S. Agrawal and R. Singh Rajput, “Denial of Services Attack Detection using Random Forest Classifier with Information Gain,” Int. J. Eng. Dev. Res., vol. 5, no. 3, pp. 929-938, 2017.
N. Farnaaz and M. A. Jabbar, “Random Forest Modeling for Network Intrusion Detection System,” Procedia Comput. Sci., vol. 89, pp. 213-217, 2016.
A. K. Hakim, M. Abdurohman, and F. A. Yulianto, “Improving DDoS detection accuracy using Six-Sigma in SDN environment,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 2, pp. 365-370, 2018.
A. S. Ahmed, R. Hassan, and N. E. Othman, “Denial of service attack over secure neighbor discovery (SeND),” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 5, pp. 1897-1904, 2018.
X. K. Li, W. Chen, Q. Zhang, and L. Wu, “Building Auto-Encoder Intrusion Detection System based on random forest feature selection,” Comput. Secur., vol. 95, p. 101851, 2020.
J. Fox and A. Leanage, “R and the Journal of Statistical Software,” J. Stat. Softw., vol. 73, no. 2, 2016.
W. Wang and S. Gombault, “Efficient detection of DDoS attacks with important attributes,” Proc. 2008 3rd Int. Conf. Risks Secur. Internet Syst. Cris. 2008, pp. 61-67, 2008.
T. Shorey, D. Subbaiah, A. Goyal, A. Sakxena, and A. K. Mishra, “Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools,” 2018 Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2018, pp. 318-322, 2018.
I. Park and S. Lee, “Spatial prediction of landslide susceptibility using a decision tree approach: a case study of the Pyeongchang area, Korea,” Int. J. Remote Sens., vol. 35, no. 16, pp. 6089-6112, 2014.
L. Breiman, “Random forests,” Mach. Learn., vol. 45, pp. 5-32, 2001.
A. Verikas, A. Gelzinis, and M. Bacauskiene, “Mining data with random forests: A survey and results of new tests,” Pattern Recognit., vol. 44, no. 2, pp. 330-349, 2011.
C. Zhang and Y. Ma, Ensemble machine learning: Methods and applications. 2012.
N. P. Lestari, “Uji Recall and Precision Sistem Temu Kembali,” Libr. Net, vol. 5, no. 3, pp. 45-46, 2016.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).