An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Cyber security has recently garnered enormous attention due to the popularity of the Internet of Things (IoT), intelligent devices rapid growth, and a vast number of real-life applications. As a result, detecting threats and constructing an efficient Intrusion detection system (IDS) have become cruc...
| Main Authors: | Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El |
|---|---|
| Format: | Article |
| Published: |
Elsevier B.V.
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/106576/ |
Similar Items
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
The intersection of targeted advertising and security: unraveling the mystery of overheard conversations
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by: Bouke, Mohamed Aly, et al.
Published: (2022)
by: Bouke, Mohamed Aly, et al.
Published: (2022)
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
by: Harun, Zati Bayani
Published: (2019)
by: Harun, Zati Bayani
Published: (2019)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
DDoS detection using active and idle features of revised CICFlowMeter and statistical approaches
by: Ali, Basheer Husham, et al.
Published: (2022)
by: Ali, Basheer Husham, et al.
Published: (2022)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017)
by: Maslan, Andi, et al.
Published: (2017)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection
System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
by: Waqar, Ali, et al.
Published: (2015)
by: Waqar, Ali, et al.
Published: (2015)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Explorations in agent-based simulation: analysis of Gini Index after zakat enforcement under interest based system
by: Putriani, Diyah, et al.
Published: (2019)
by: Putriani, Diyah, et al.
Published: (2019)
An empirical assessment of ML models for 5G network intrusion detection: a data leakage-free approach
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
SMRD: a novel cyber warfare modeling framework for Social Engineering, Malware, Ransomware, and Distributed Denial-of-Service based on a system of nonlinear differential equations
by: Bouke, Mohamed Aly, et al.
Published: (2024)
by: Bouke, Mohamed Aly, et al.
Published: (2024)
Similar Items
-
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020) -
The intersection of targeted advertising and security: unraveling the mystery of overheard conversations
by: Bouke, Mohamed Aly, et al.
Published: (2023) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by: Bouke, Mohamed Aly, et al.
Published: (2022)