Abstract
The massive increase in network-based traffic reveals enterprise networks to a vast range of threats. Disruptive traffic is interfering with the daily activity of the network by wasting organizational energy and time. Efficiency is boosted by effective methods for detecting, defending, and minimizing disruptive events. IDS is one of the most important characteristics of network and host protection since it is deployed in the network and at the client hardware level to track suspicious traffic in the network and on specific computers. The information obtained from IDS includes the threats and normal activities which will help in improving the performance of the IDS. The patterns and crucial threats can be identified by analyzing the obtained information. The data is analyzed using the tableau application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Vaidya R (2018) Cyber security breaches survey 2018: statistical release, technical report. Department for Digital, Culture, Media and Sport, London
Morgan S (2017) Cybercrime report, technical report, cybersecurity ventures
Annual Cybersecurity Report, Executive Summary, Cisco (2018)
Bace R, Mell P (2001) NIST special publication on intrusion detection systems, technical Report. Booz-Allen and Hamilton Inc., McLean, VA
Binbusayyis A, Vaiyapuri T (2020) Comprehensive analysis and recommendation of feature evaluation measures for intrusion detection. Heliyon 6(7):e04262
Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160
Lian W, Nie G, Jia B, Shi D, Fan Q, Liang Y (2020) An intrusion detection method based on decision tree-recursive feature elimination in ensemble learning. Math Prob Eng 2020
Varghese JE, Muniyal B (2018) A comparative analysis of different soft computing techniques for the intrusion detection system. In: International symposium on security in computing and communication. Springer, Singapore, pp 563–577
Kasongo SM, Sun Y (2020) A deep long short-term memory based classifier for the wireless intrusion detection system. ICT Express 6(2):98–103
Zhu M, Ye K, Xu C-Z (2018) Network anomaly detection and identification based on deep learning methods. In: International conference on cloud computing. Springer, Cham, pp 219–234
Li Y, Xu Y, Liu Z, Hou H, Zheng Y, Xin Y, Zhao Y, Cui L (2020) Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154:107450
Boutaba R, Salahuddin MA, Limam N, Ayoubi S, Shahriar N, Estrada-Solano F, Caicedo OM (2018) A comprehensive survey on machine learning for networking: evolution, applications, and research opportunities. J Internet Serv Appl 9(1):1–99
Mahfouz AM, Venugopal D, Shiva SG (2020) Comparative analysis of ML classifiers for network intrusion detection. In: Fourth international congress on information and communication technology. Springer, Singapore, pp 193–207
Zhao H, Li M, Zhao H (2020) Artificial intelligence-based ensemble approach for intrusion detection systems. J Vis Commun Image Representation 71:102736
Paulauskas N, Baskys A (2019) Application of histogram-based outlier scores to detect computer network anomalies. Electronics 8(11):1251
Dey SK, Raihan Uddin M, Mahbubur Rahman M (2020) Performance analysis of SDN-based intrusion detection model with feature selection approach. In: Proceedings of the international joint conference on computational intelligence. Springer, Singapore, pp 483–494
Wu, Peilun, Hui Guo, and Richard Buckland. “A transfer learning approach for network intrusion detection.“ In 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA), pp. 281–285. IEEE, 2019.
Mulay SA, Devale PR, Garje GV (2010) Intrusion detection system using support vector machine and decision tree. Int J Comput Appl 3(3):40–43
Yihunie F, Abdelfattah E, Regmi A (2019) Applying machine learning to anomaly-based intrusion detection systems. In: 2019 IEEE Long Island Systems, applications, and technology conference (LISAT). IEEE, pp 1–5
NSL-KDD dataset [online] is available: http://www.unb.ca/cic/datasets/nsl.html. Accessed on 21 Oct 2018
Ingre B, Yadav A (2015) Performance analysis of NSL-KDD dataset using ANN. In: International conference on signal processing and communication engineering systems (SPACES). IEEE
Dhanabal L, Shantharajah SP (2015) A study on NSL-KDD dataset for intrusion detection system based on classification algorithms. Int J Adv Res Comput Commun Eng 4(6):446–452
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pande, S., Kamparia, A., Gupta, D. (2022). Recommendations for DDOS Threats Using Tableau. In: Gupta, D., Polkowski, Z., Khanna, A., Bhattacharyya, S., Castillo, O. (eds) Proceedings of Data Analytics and Management . Lecture Notes on Data Engineering and Communications Technologies, vol 91. Springer, Singapore. https://doi.org/10.1007/978-981-16-6285-0_7
Download citation
DOI: https://doi.org/10.1007/978-981-16-6285-0_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-6284-3
Online ISBN: 978-981-16-6285-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)