Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 3 SI
Page No. 5979 - 5984

A Novel Dimensional Reduction Model for Detecting DDoS Attacks

Authors : Alaa M. Hasan Abu Daym and Bilal Majeed Abdulridha Al-Latteef

References

ARBOR Networks, 2009. Worldwide infrastructure security report. http://www.arbornetworks.com/research/infrastructure-security-report.

Anonymus, 2017. Dimensionality algorithms: Strengths and weaknesses. EliteDataScience, San Francisco, California, USA.

Anonymus, 2018. Protect the pulse of your business. Imperva, Redwood Shores, Redwood City, California, USA. https://www.imperva.com/

Buragohain, C., M.J. Kalita, S. Singh and D.K. Bhattacharyya, 2015. Anomaly based DDoS attack detection. Intl. J. Comput. Appl., 123: 35-40.
CrossRef  |  Direct Link  |  

CC., 2017. Machine learning-dimensionality reduction-feature extraction and selection. Cognitive Class, USA.

Denning, D.E., 1987. An intrusion-detection model. IEEE Trans. Software Eng., SE-13: 222-232.
CrossRef  |  

Douligeris, C. and A. Mitrokotsa, 2004. Ddos attacks and defense mechanisms: Classification and state-of-the-art. Comput. Networks, 44: 643-666.
CrossRef  |  

Fengxiang, Z. and S. Abe, 2007. A heuristic DDoS flooding attack detection mechanism analyses based on the relationship between input and output traffic volumes. Proceedings of the 2007 16th International Conference on Computer Communications and Networks, August 13-16, 2007, IEEE, Honolulu, Hawaii, USA., ISBN:978-1-4244-1250-1, pp: 798-802.

Fodor, I.K., 2002. A survey of dimension reduction techniques. Technical Report, pp: 1-18. https://computation.llnl.gov/casc/sapphire/pubs/148494.pdf.

Gangwar, M.A. and M.S. Sahu, 2014. A survey on anomaly and signature based Intrusion Detection System (IDS). Intl. J. Eng. Res. Appl., 4: 67-72.
Direct Link  |  

Jia, B., Y. Ma, X. Huang, Z. Lin and Y. Sun, 2016. A novel real-time ddos attack detection mechanism based on MDRA algorithm in big data. Math. Prob. Eng., 2016: 1-10.
CrossRef  |  Direct Link  |  

Karimazad, R. and A. Faraahi, 2011. An anomaly-based method for DDoS attacks detection using RBF neural networks. Proceedings of the International Conference on Network and Electronics Engineering, September 16-18, 2011, IACSIT Press, Singapore, pp: 16-18.

Olusola, A.A., A.S. Oladele and D.O. Abosede, 2010. Analysis of KDD99 intrusion detection dataset for selection of relevance features. Proceedings of the World Congress on Engineering and Computer Science (WCECS) Vol. 1, October 20-22, 2010, San Francisco, USA., ISBN:978-988-17012-0-6, pp: 1-7.

Patcha, A. and J.M. Park, 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Networks, 51: 3448-3470.
CrossRef  |  

Staudemeyer, R.C. and C.W. Omlin, 2014. Extracting salient features for network intrusion detection using machine learning methods: Research article. South Afr. Comput. J., 52: 82-96.
CrossRef  |  Direct Link  |  

Tama, B.A. and K.H. Rhee, 2015. Data mining techniques in DoS/DDoS attack detection: A literature review. Inf. Japan, 18: 3739-3747.

Wang, X. and K.K. Paliwal, 2003. Feature extraction and dimensionality reduction algorithms and their applications in vowel recognition. Pattern Recognit., 36: 2429-2439.
CrossRef  |  Direct Link  |  

Zargar, S.T., J. Joshi and D. Tipper, 2013. A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks. IEEE. Commun. Surv. Tutorials, 15: 2046-2069.
CrossRef  |  Direct Link  |  

Zekri, M., S. El Kafhali, N. Aboutabit and Y. Saadi, 2017. DDoS attack detection using machine learning techniques in cloud computing environments. Proceedings of the 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), October 24-26, 2017, IEEE, Rabat, Morocco, ISBN:978-1-5386-1116-6, pp: 1-7.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved