Skip to main content

Recommendations for DDOS Attack-Based Intrusion Detection System Through Data Analysis

  • Conference paper
  • First Online:
Proceedings of Second Doctoral Symposium on Computational Intelligence

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1374))

Abstract

As internet usage is increasing as the days are passing on, it is essential to secure the network from intruders. So, it indicates the necessity of the construction of an intrusion detection system. But one must know on which basis the intrusion detection system (IDS) needs to be built. This thought dragged us to generate a new idea of forming the recommendations which can act as a basis for the development of IDS. In this paper, we have provided the recommendation by analyzing the standard datasets, KDD, and NSL-KDD. For the analysis purpose, MS-Excel was utilized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ruan, Z., Miao, Y., Pan, L., Patterson, N., & Zhang, J. (2017). Visualization of big data security: A case study on the KDD99 cup data set. Digital Communications and Networks, 3, 250–259.

    Article  Google Scholar 

  2. Ji, H., Kim, D., Shin, D., & Shin, D. (2018). A study on comparison of KDD CUP 99 and NSL-KDD using artificial neural network. Lecture Notes in Electrical Engineering, 474, 452–457.

    Article  Google Scholar 

  3. Ibrahimi, K., & Ouaddane, M. (2017). Management of intrusion detection systems based-KDD99: Analysis with LDA and PCA. In: International Conference on Wireless Networks and Mobile Communications (WINCOM) 2017.

    Google Scholar 

  4. Othman, S. M., Ba-Alwi, F. M., Alsohybe, N. T., & Al-Hashida, A. Y. (2018). Intrusion detection model using machine learning algorithm on Big Data environment. Journal of Big Data, 5.

    Google Scholar 

  5. Jia, Y., Wang, M., & Wang, Y. (2019). Network intrusion detection algorithm based on deep neural network. IET Information Security, 13, 48–53.

    Article  Google Scholar 

  6. Anand Sukumar, J. V., Pranav, I., Neetish, M. M., & Narayanan, J. (2018). Network intrusion detection using improved genetic k-means algorithm. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), (pp. 2441–2446).

    Google Scholar 

  7. Basnet, R. B., Shash, R., Johnson, C., Walgren, L., & Doleck, T. (2019). Towards detecting and classifying network intrusion traffic using deep learning frameworks. Journal of Internet Services and Information Security, 9, 1–17.

    Google Scholar 

  8. Kumar, V., Das, A. K., & Sinha, D. (2019). UIDS: A unified intrusion detection system for IoT environment. Evolutionary Intelligence.

    Google Scholar 

  9. Khonde, S., & Ulagamuthalvi, V. (209). Fusion of feature selection and random forest for an anomaly-based intrusion detection system. Journal of Computational and Theoretical Nanoscience, 16(209), 3603–3607.

    Google Scholar 

  10. Pawlicki, M., Choraś, M., & Kozik, R. (2020). Defending network intrusion detection systems against adversarial evasion attacks. Future Generation Computer Systems, 110, 148–154.

    Article  Google Scholar 

  11. Ji, Y., & Li, X. (2020). An efficient intrusion detection model based on deep FM. In Proceedings on 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference ITNEC 2020 (pp. 778–783).

    Google Scholar 

  12. Su, T., Sun, H., Zhu, J., Wang, S., & Li, Y. (2020). BAT: Deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE Access, 8, 29575–29585.

    Article  Google Scholar 

  13. Abrar, I., Ayub, Z., Masoodi, F., & Bamhdi, A. M. (2020). A machine learning approach for intrusion detection system on NSL-KDD dataset (pp. 919–924).

    Google Scholar 

  14. Gao, X., Shan, C., Hu, C., Niu, Z., & Liu, Z. (2019). An adaptive ensemble machine learning model for intrusion detection. IEEE Access, 7, 82512–82521.

    Article  Google Scholar 

  15. Aljawarneh, S., Aldwairi, M., & Yassein, M. B. (2018). Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. Journal of Computer Science, 25(2018), 152–160.

    Article  Google Scholar 

  16. Bhattacharjee, P. S., Fujail, A. K. M., & Begum, S. A. (2017). Intrusion detection system for NSL-KDD data set using vectorised fitness function in genetic algorithm. The Advances in Computational Sciences and Technology, 10(2017), 235–246.

    Google Scholar 

  17. Pande S., Khamparia A., Gupta D., & Thanh D. N. H. (2021) DDOS Detection using machine learning technique. In A. Khanna, A. K. Singh, & A. Swaroop (Eds.), Recent studies on computational intelligence. Studies in computational intelligence (Vol. 921). Springer. https://doi.org/10.1007/978-981-15-8469-5_5

  18. Pande, S. D., & Khamparia, A. (2019). A review on detection of DDOS attack using machine learning and deep learning techniques. Think India Journal, 2035–2043.

    Google Scholar 

  19. Pande, S., & Gadicha, A. B. (2015). Prevention mechanism on DDOS attacks by using multilevel filtering of distributed firewalls. International Journal on Recent and Innovation Trends in Computing and Communication, 3(3). ISSN: 2321-8169.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pande, S., Kamparia, A., Gupta, D. (2022). Recommendations for DDOS Attack-Based Intrusion Detection System Through Data Analysis. In: Gupta, D., Khanna, A., Kansal, V., Fortino, G., Hassanien, A.E. (eds) Proceedings of Second Doctoral Symposium on Computational Intelligence . Advances in Intelligent Systems and Computing, vol 1374. Springer, Singapore. https://doi.org/10.1007/978-981-16-3346-1_73

Download citation

Publish with us

Policies and ethics