Skip to main content

Towards Feature Selection for Detection of DDoS Attack

  • Conference paper
  • First Online:
Computing in Engineering and Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1025))

Abstract

Due to the rapid use of the internet, the Distributed Denial of Service (DDoS) attack is affected by E-Commerce, government, and private IT infrastructure. Intrusion Detection System is the best way to deal with the detection of DDoS attacks. In this paper, we focused on the feature selection process to improve the performance by the selection of important features. Information Gain with Ranker algorithm is used for the feature selection process. After the feature selection process, the proposed system uses Random Forest, J48, LMT (Logistic Model Tree) classifiers for the detection of the DDoS attack. The proposed system is tested with the help of CICIDS2017 dataset. The experimentation result shows that J48 classifier provides improved detection rate as compared to Random Forest and LMT with important features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. DDoS Attack Report Q2 2018, by haltDoS blog

    Google Scholar 

  2. Pandey, V.C., Peddoju, S.K., Deshpande, P.S.: Sadhana 43, 32 (2018). https://doi.org/10.1007/s12046-018-0800-7

    Article  Google Scholar 

  3. Deshpande, P., Sharma, S.C., Sateesh Kumar, P.: Security threats in cloud computing. In: International Conference on Computing, Communication and Automation (ICCCA), Nida-India, pp. 632–636 (2015)

    Google Scholar 

  4. Lei, S.: A feature selection method based on information gain and genetic algorithm. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 2, pp. 355–358. IEEE (2012)

    Google Scholar 

  5. Alhaj, T.A., Siraj, M.M., Zainal, A., Elshoush, H.T., Elhaj, F.: Feature selection using information gain for improved structural-based alert correlation. PLoS One 11(11), e0166017 (2016)

    Google Scholar 

  6. Shree Singh, N.A., Singh, K.J., De, T.: Distributed denial of service attack detection using naive Bayes classifier through info gain feature selection. In: Proceedings of the International Conference on Informatics and Analytics, p. 54. ACM (2016)

    Google Scholar 

  7. Tao, P., Sun, Z., Sun, Z.: An improved intrusion detection algorithm based on GA and SVM. IEEE Access 6, 13624–13631 (2018)

    Article  Google Scholar 

  8. Deshpande, P., Aggarwal, A., Sharma, S.C., Kumar, S.P.: Distributed port-scan attack in cloud environment. In: Fifth International Conference on Computational Aspects of Social Networks (CASoN), pp. 27–31 (2013)

    Google Scholar 

  9. Shakya V., Makwana, R.R.S.: Feature selection based intrusion detection system using the combination of DBSCAN, K-Mean++ and SMO algorithms. In: 2017 International Conference on Trends in Electronics and Informatics (ICEI), pp. 928–932. IEEE (2017)

    Google Scholar 

  10. Alkasassbeh, M., Al-Naymat, G., Hamadneh, N., Obeidat, I., Almseidin, M.: Intensive preprocessing of KDD Cup 99 for network intrusion classification using machine learning techniques. arXiv preprint arXiv:1805.10458 (2018)

  11. Aljawarneh, S., Yassein, M.B., Aljundi, M.: An enhanced J48 classification algorithm for the anomaly intrusion detection systems. Cluster Comput. 1–17 (2017)

    Google Scholar 

  12. Alazab, A., Hobbs, M., Abawajy, J., Alazab, M.: Using feature selection for intrusion detection system. In: 2012 International Symposium on Communications and Information Technologies (ISCIT), pp. 296–301. IEEE (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anuja Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, A., Kshirsagar, D. (2020). Towards Feature Selection for Detection of DDoS Attack. In: Iyer, B., Deshpande, P., Sharma, S., Shiurkar, U. (eds) Computing in Engineering and Technology. Advances in Intelligent Systems and Computing, vol 1025. Springer, Singapore. https://doi.org/10.1007/978-981-32-9515-5_21

Download citation

Publish with us

Policies and ethics