Skip to main content

Analysis of Feature Selection Techniques to Detect DoS Attacks Using Rule-Based Classifiers

  • Conference paper
  • First Online:
Applied Information Processing Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1354))

Abstract

Denial of Service (DoS) attacks are emerging as a security threat, which, when ignored, may result in enormous losses for the organizations. Such attacks lead to the unavailability of the services provided by the organizations to legitimate users. The detection of such attacks with lower computation and minimization of errors is an ongoing research area. This paper focuses on analyzing different feature selection methods for feature selection in the detection of DoS attacks. The analysis of feature selection methods provides relevant and noisy feature subsets based on the score obtained by each method. The obtained relevant feature subset is tested on the CICIDS-2017 DoS dataset and achieves higher accuracy of 99.9591% with the PART classifier.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wankhede, S., Kshirsagar, D.: Dos attack detection using machine learning and neural network. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1–5. IEEE (2018)

    Google Scholar 

  2. Nicholson, P.: 5 most famous dos attacks (2020). https://www.a10networks.com/blog/5-most-famous-ddos-attacks/

  3. Li, J., Cheng, K., Wang, S., Morstatter, F., Trevino, R.P., Tang, J., Liu, H.: Feature selection: a data perspective. ACM Comput. Surv. (CSUR) 50(6), 1–45 (2017)

    Google Scholar 

  4. Ibrahim, H.E., Badr, S.M., Shaheen, M.A.: Adaptive layered approach using machine learning techniques with gain ratio for intrusion detection systems (2012). arXiv:1210.7650

  5. Deshpande, P., Aggarwal, A., Sharma, S.C., Kumar, P.S., Abraham, A.:Distributed port-scan attack in cloud environment. In: Fifth International Conference on Computational Aspects of Social Networks (CASoN), pp. 27–31 (2013)

    Google Scholar 

  6. Ambusaidi, M.A., He, X., Nanda, P., Tan, Z.: Building an intrusion detection system using a filter-based feature selection algorithm. IEEE Trans. Comput. 65(10), 2986–2998 (2016)

    Google Scholar 

  7. Kshirsagar, D., Kumar, S.: An ensemble feature reduction method for web attack detection. J. Discret. Math. Sci. Cryptogr. 23(1), 283–291 (2020)

    Article  Google Scholar 

  8. Pandey, V.C., Peddoju, S.K., Deshpande, P.S.: A statistical and distributed packet filter against DDoS attacks in cloud environment. Sādhanā 43, 32 (2018). https://doi.org/10.1007/s12046-018-0800-7

    Article  Google Scholar 

  9. Mohammadi, S., Desai, V., Karimipour, H.: Multivariate mutual information based feature selection for cyber intrusion detection. In: 2018 IEEE Electrical Power and Energy Conference (EPEC), pp. 1–6. IEEE (2018)

    Google Scholar 

  10. Dua, M., et al.: Attribute selection and ensemble classifier based novel approach to intrusion detection system. Procedia Comput. Sci. 167, 2191–2199 (2020)

    Article  Google Scholar 

  11. Umar, M.A., Zhanfang, C., Liu, Y.: Network intrusion detection using wrapper-based decision tree for feature selection. In Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering, pp. 5–13 (2020)

    Google Scholar 

  12. Sornsuwit, P., Jaiyen, S.: A new hybrid machine learning for cybersecurity threat detection based on adaptive boosting. Appl. Artif. Intell. 33(5), 462–482 (2019)

    Article  Google Scholar 

  13. Salih, A.A., Abdulrazaq, M.B.: Combining best features selection using three classifiers in intrusion detection system. In: 2019 International Conference on Advanced Science and Engineering (ICOASE), pp. 94–99. IEEE (2019)

    Google Scholar 

  14. Tchakoucht, T.A.I.T., Mostafa Ezziyyani, M.: Building a fast intrusion detection system for high-speed-networks: probe and dos attacks detection. Procedia Comput. Sci. 127, 521–530 (2018)

    Google Scholar 

  15. Pattawaro, A., Polprasert, C.: Anomaly-based network intrusion detection system through feature selection and hybrid machine learning technique. In: 2018 16th International Conference on ICT and Knowledge Engineering (ICT&KE), pp. 1–6. IEEE (2018)

    Google Scholar 

  16. Aljawarneh, S., Aldwairi, M., Yassein, M.B.: Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J. Comput. Sci. 25, 152–160 (2018)

    Google Scholar 

  17. Priyadarsini, P.I., Sai, M.S.S., Suneetha, A., Santhi, M.V.B.T.: Robust feature selection technique for intrusion detection system. Inter. J. Control Autom. 11(2), 33–44 (2018)

    Google Scholar 

  18. Kshirsagar, D., Kumar, S.: Identifying reduced features based on ig-threshold for dos attack detection using part. In: International Conference on Distributed Computing and Internet Technology, pp. 411–419. Springer (2020)

    Google Scholar 

  19. Shaikh, J.M., Kshirsagar, D.: Feature reduction-based dos attack detection system. In: Next Generation Information Processing System, pp. 170–177. Springer, Berlin

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Atharva Vaidya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vaidya, A., Kshirsagar, D. (2022). Analysis of Feature Selection Techniques to Detect DoS Attacks Using Rule-Based Classifiers. In: Iyer, B., Ghosh, D., Balas, V.E. (eds) Applied Information Processing Systems . Advances in Intelligent Systems and Computing, vol 1354. Springer, Singapore. https://doi.org/10.1007/978-981-16-2008-9_30

Download citation

Publish with us

Policies and ethics