Towards Feature Selection for Detection of DDoS Attack

  • Anuja PatilEmail author
  • Deepak Kshirsagar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1025)


Due to the rapid use of the internet, the Distributed Denial of Service (DDoS) attack is affected by E-Commerce, government, and private IT infrastructure. Intrusion Detection System is the best way to deal with the detection of DDoS attacks. In this paper, we focused on the feature selection process to improve the performance by the selection of important features. Information Gain with Ranker algorithm is used for the feature selection process. After the feature selection process, the proposed system uses Random Forest, J48, LMT (Logistic Model Tree) classifiers for the detection of the DDoS attack. The proposed system is tested with the help of CICIDS2017 dataset. The experimentation result shows that J48 classifier provides improved detection rate as compared to Random Forest and LMT with important features.


Feature selection Information gain DDoS 


  1. 1.
    DDoS Attack Report Q2 2018, by haltDoS blogGoogle Scholar
  2. 2.
    Pandey, V.C., Peddoju, S.K., Deshpande, P.S.: Sadhana 43, 32 (2018). Scholar
  3. 3.
    Deshpande, P., Sharma, S.C., Sateesh Kumar, P.: Security threats in cloud computing. In: International Conference on Computing, Communication and Automation (ICCCA), Nida-India, pp. 632–636 (2015)Google Scholar
  4. 4.
    Lei, S.: A feature selection method based on information gain and genetic algorithm. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 2, pp. 355–358. IEEE (2012)Google Scholar
  5. 5.
    Alhaj, T.A., Siraj, M.M., Zainal, A., Elshoush, H.T., Elhaj, F.: Feature selection using information gain for improved structural-based alert correlation. PLoS One 11(11), e0166017 (2016)Google Scholar
  6. 6.
    Shree Singh, N.A., Singh, K.J., De, T.: Distributed denial of service attack detection using naive Bayes classifier through info gain feature selection. In: Proceedings of the International Conference on Informatics and Analytics, p. 54. ACM (2016)Google Scholar
  7. 7.
    Tao, P., Sun, Z., Sun, Z.: An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6, 13624–13631 (2018)CrossRefGoogle Scholar
  8. 8.
    Deshpande, P., Aggarwal, A., Sharma, S.C., Kumar, S.P.: Distributed port-scan attack in cloud environment. In: Fifth International Conference on Computational Aspects of Social Networks (CASoN), pp. 27–31 (2013)Google Scholar
  9. 9.
    Shakya V., Makwana, R.R.S.: Feature selection based intrusion detection system using the combination of DBSCAN, K-Mean++ and SMO algorithms. In: 2017 International Conference on Trends in Electronics and Informatics (ICEI), pp. 928–932. IEEE (2017)Google Scholar
  10. 10.
    Alkasassbeh, M., Al-Naymat, G., Hamadneh, N., Obeidat, I., Almseidin, M.: Intensive preprocessing of KDD Cup 99 for network intrusion classification using machine learning techniques. arXiv preprint arXiv:1805.10458 (2018)
  11. 11.
    Aljawarneh, S., Yassein, M.B., Aljundi, M.: An enhanced J48 classification algorithm for the anomaly intrusion detection systems. Cluster Comput. 1–17 (2017)Google Scholar
  12. 12.
    Alazab, A., Hobbs, M., Abawajy, J., Alazab, M.: Using feature selection for intrusion detection system. In: 2012 International Symposium on Communications and Information Technologies (ISCIT), pp. 296–301. IEEE (2012)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Engineering and Information TechnologyCollege of EngineeringPuneIndia

Personalised recommendations