메뉴 건너뛰기




Volumn 2016, Issue 1, 2016, Pages

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing

Author keywords

Cloud DDoS; Ensemble based multi filter feature selection method; Filter methods; Intrusion detection system; Machining learning

Indexed keywords

BANDPASS FILTERS; CLASSIFICATION (OF INFORMATION); CLOUD COMPUTING; DECISION TREES; DENIAL-OF-SERVICE ATTACK; INTRUSION DETECTION; MERCURY (METAL); NETWORK SECURITY;

EID: 84969794985     PISSN: 16871472     EISSN: 16871499     Source Type: Journal    
DOI: 10.1186/s13638-016-0623-3     Document Type: Article
Times cited : (281)

References (45)
  • 3
    • 84888842651 scopus 로고    scopus 로고
    • Interconnecting federated clouds by using publish-subscribe service
    • C Esposito, M Ficco, F Palmieri, A Castiglione, Interconnecting federated clouds by using publish-subscribe service. Cluster comput 16(4), 887–903 (2013)
    • (2013) Cluster comput , vol.16 , Issue.4 , pp. 887-903
    • Esposito, C.1    Ficco, M.2    Palmieri, F.3    Castiglione, A.4
  • 5
    • 84900419562 scopus 로고    scopus 로고
    • Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
    • S Shamshirband, A Patel, NB Anuar, MLM Kiah, A Abraham, Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks. Eng Appl Artif Intell 32, 228–241 (2014)
    • (2014) Eng Appl Artif Intell , vol.32 , pp. 228-241
    • Shamshirband, S.1    Patel, A.2    Anuar, N.B.3    Kiah, M.L.M.4    Abraham, A.5
  • 6
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
    • O Osanaiye, K-KR Choo, M Dlodlo, Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl 67, 147–65 (2016)
    • (2016) J. Netw. Comput. Appl , vol.67 , pp. 147-165
    • Osanaiye, O.1    Choo, K.-K.R.2    Dlodlo, M.3
  • 7
    • 84924706348 scopus 로고    scopus 로고
    • Stealthy denial of service strategy in cloud computing
    • M Ficco, M Rak, Stealthy denial of service strategy in cloud computing. IEEE Trans Cloud Comput 3(1), 80–94 (2015)
    • (2015) IEEE Trans Cloud Comput , vol.3 , Issue.1 , pp. 80-94
    • Ficco, M.1    Rak, M.2
  • 8
    • 84901987724 scopus 로고    scopus 로고
    • Incremental proxy re-encryption scheme for mobile cloud computing environment
    • AN Khan, MM Kiah, SA Madani, M Ali, S Shamshirband, Incremental proxy re-encryption scheme for mobile cloud computing environment. J Supercomput 68(2), 624–651 (2014)
    • (2014) J Supercomput , vol.68 , Issue.2 , pp. 624-651
    • Khan, A.N.1    Kiah, M.M.2    Madani, S.A.3    Ali, M.4    Shamshirband, S.5
  • 10
    • 84969891769 scopus 로고    scopus 로고
    • Geographical information system parallelization for spatial big data processing: a review
    • (Springer, in press)
    • L Zhao, L Chen, R Ranjan, K-K R Choo and J He, Geographical information system parallelization for spatial big data processing: a review. Cluster Comput. (Springer, 2015 in press)
    • (2015) Cluster Comput.
    • Zhao, L.1    Chen, L.2    Ranjan, R.3    Choo, K.-K.R.4    He, J.5
  • 11
    • 84916888408 scopus 로고    scopus 로고
    • Impacts of increasing volume of digital forensic data: a survey and future research challenges
    • D Quick, K-KR Choo, Impacts of increasing volume of digital forensic data: a survey and future research challenges. Digit Investig 11(4), 273–294 (2014)
    • (2014) Digit Investig , vol.11 , Issue.4 , pp. 273-294
    • Quick, D.1    Choo, K.-K.R.2
  • 12
    • 85086766707 scopus 로고    scopus 로고
    • Wei, C Hu: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans Cloud Comput
    • Z Xu, Y Liu, N Yen, L Mei, X Luo, X Wei, C Hu, Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans Cloud Comput (2016) DOI: 10.1109/TCC.2016.2517638.
    • (2016) Mei, X Luo , vol.10
    • Z Xu, Y.1    Liu, N.2    Yen, L.3
  • 13
    • 84958045978 scopus 로고    scopus 로고
    • Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media
    • Z Xu, H Zhang, V Sugumaran, K-KR Choo, L Mei, Y Zhu, Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media. EURASIP J Wirel Commun Netw 1, 1–9 (2016)
    • (2016) EURASIP J Wirel Commun Netw , vol.1 , pp. 1-9
    • Xu, Z.1    Zhang, H.2    Sugumaran, V.3    Choo, K.-K.R.4    Mei, L.5    Zhu, Y.6
  • 14
    • 84964331105 scopus 로고    scopus 로고
    • Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles
    • Elsevier, in press)
    • J Peng, K-K R Choo, H Ashman, Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles. J Netw Comput Appl. (Elsevier, 2016 in press)
    • (2016) J Netw Comput Appl.
    • Peng, J.1    Choo, K.-K.R.2    Ashman, H.3
  • 15
    • 80052421871 scopus 로고    scopus 로고
    • Fast wrapper feature subset selection in high-dimensional datasets by means of filter re-ranking
    • P Bermejo, L de la Ossa, J Gámez, J Puerta, Fast wrapper feature subset selection in high-dimensional datasets by means of filter re-ranking. Knowl-Based Syst 25(1), 35–44 (2012)
    • (2012) Knowl-Based Syst , vol.25 , Issue.1 , pp. 35-44
    • Bermejo, P.1    de la Ossa, L.2    Gámez, J.3    Puerta, J.4
  • 17
    • 84944078166 scopus 로고    scopus 로고
    • Constructing important features from massive network traffic for lightweight intrusion detection
    • W Wang, Y He, J Liu, S Gombault, Constructing important features from massive network traffic for lightweight intrusion detection. IET Inform Secur 9(6), 374–379 (2015)
    • (2015) IET Inform Secur , vol.9 , Issue.6 , pp. 374-379
    • Wang, W.1    He, Y.2    Liu, J.3    Gombault, S.4
  • 18
    • 79151484606 scopus 로고    scopus 로고
    • Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset
    • V Bolon-Canedo, N Sanchez-Marono, A Alonso-Betanzos, Feature selection and classification in multiple class datasets: an application to KDD Cup 99 dataset. Expert Syst Appl 38(5), 5947–5957 (2011)
    • (2011) Expert Syst Appl , vol.38 , Issue.5 , pp. 5947-5957
    • Bolon-Canedo, V.1    Sanchez-Marono, N.2    Alonso-Betanzos, A.3
  • 19
    • 11244260106 scopus 로고    scopus 로고
    • accessed 7 February
    • Data mining software in Java. http://www.cs.waikato.ac.nz/ml/weka/(Last accessed 7 February 2016)
    • (2016) Data mining software in Java
  • 20
    • 84865209539 scopus 로고    scopus 로고
    • A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier
    • L Koc, T Mazzuchi, S Sarkani, A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Syst Appl 39(18), 13492–13500 (2012)
    • (2012) Expert Syst Appl , vol.39 , Issue.18 , pp. 13492-13500
    • Koc, L.1    Mazzuchi, T.2    Sarkani, S.3
  • 21
  • 22
    • 84878107136 scopus 로고    scopus 로고
    • GMDH-based networks for intelligent intrusion detection
    • Z Baig, S Sait, A Shaheen, GMDH-based networks for intelligent intrusion detection. Eng Appl Artif Intel 26(7), 1731–1740 (2013)
    • (2013) Eng Appl Artif Intel , vol.26 , Issue.7 , pp. 1731-1740
    • Baig, Z.1    Sait, S.2    Shaheen, A.3
  • 23
    • 84864772502 scopus 로고    scopus 로고
    • An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection
    • S Lin, K Ying, C Lee, Z Lee, An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl Soft Comput 12(10), 3285–3290 (2012)
    • (2012) Appl Soft Comput , vol.12 , Issue.10 , pp. 3285-3290
    • Lin, S.1    Ying, K.2    Lee, C.3    Lee, Z.4
  • 24
    • 81855197007 scopus 로고    scopus 로고
    • An efficient intrusion detection system based on support vector machines and gradually feature removal method
    • Y Li, J Xia, S Zhang, J Yan, X Ai, K Dai, An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst Appl 39(1), 424–430 (2012)
    • (2012) Expert Syst Appl , vol.39 , Issue.1 , pp. 424-430
    • Li, Y.1    Xia, J.2    Zhang, S.3    Yan, J.4    Ai, X.5    Dai, K.6
  • 25
    • 81855221688 scopus 로고    scopus 로고
    • Decision tree based light weight intrusion detection using a wrapper approach
    • S Sindhu, S Geetha, A Kannan, Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst Appl 39(1), 129–141 (2012)
    • (2012) Expert Syst Appl , vol.39 , Issue.1 , pp. 129-141
    • Sindhu, S.1    Geetha, S.2    Kannan, A.3
  • 26
    • 84893334410 scopus 로고    scopus 로고
    • Proceedings of the 8th International Conference on Networking, Architecture and Storage (NAS)
    • IEEE, Xi’an
    • F Zhang, D Wang, Proceedings of the 8th International Conference on Networking, Architecture and Storage (NAS), in An effective feature selection approach for network intrusion detection (IEEE, Xi’an, 2013), pp. 307–311
    • (2013) An effective feature selection approach for network intrusion detection , pp. 307-311
    • Zhang, F.1    Wang, D.2
  • 27
    • 84969891743 scopus 로고    scopus 로고
    • Multi-measure multi-weight ranking approach for the identification of the network features for the detection of DoS and Probe attacks
    • S Bhattacharya, S Selvakumar, Multi-measure multi-weight ranking approach for the identification of the network features for the detection of DoS and Probe attacks. Compt. J. 1-21 (2015)
    • (2015) Compt. J , pp. 1-21
    • Bhattacharya, S.1    Selvakumar, S.2
  • 28
    • 84969852496 scopus 로고    scopus 로고
    • Analysis of KDD’99 intrusion detection dataset for selection of relevance features (San Francisco
    • A Olusola, A Oladele, D Abosede, in Proceedings of the World Congress on Engineering and Computer Science. Analysis of KDD’99 intrusion detection dataset for selection of relevance features (San Francisco, USA, 2010), pp.1-7. http://www.iaeng.org/publication/WCECS2010/WCECS2010_pp162-168.pdf
    • (2010) USA , pp. 1-7
  • 29
    • 84876731442 scopus 로고    scopus 로고
    • Designing of on line intrusion detection system using rough set theory and Q-learning algorithm
    • N Sengupta, J Sen, J Sil, M Saha, Designing of on line intrusion detection system using rough set theory and Q-learning algorithm. Neurocomputing 111, 161–168 (2013)
    • (2013) Neurocomputing , vol.111 , pp. 161-168
    • Sengupta, N.1    Sen, J.2    Sil, J.3    Saha, M.4
  • 34
    • 84990211540 scopus 로고    scopus 로고
    • Adaptive layered approach using machine learning techniques with gain ratio for intrusion detection systems
    • H Ibrahim, S Badr, M Shaheen, Adaptive layered approach using machine learning techniques with gain ratio for intrusion detection systems. Int J Comput Appl 56(7), 10–16 (2012)
    • (2012) Int J Comput Appl , vol.56 , Issue.7 , pp. 10-16
    • Ibrahim, H.1    Badr, S.2    Shaheen, M.3
  • 36
    • 84867852050 scopus 로고    scopus 로고
    • Detecting unknown computer worm activity via support vector machines and active learning
    • N Nissim, R Moskovitch, L Rokach, Y Elovici, Detecting unknown computer worm activity via support vector machines and active learning. Pattern Anal Appl 15(4), 459–475 (2012)
    • (2012) Pattern Anal Appl , vol.15 , Issue.4 , pp. 459-475
    • Nissim, N.1    Moskovitch, R.2    Rokach, L.3    Elovici, Y.4
  • 37
    • 84936863859 scopus 로고    scopus 로고
    • A hybrid algorithm for feature subset selection in high-dimensional datasets using FICA and IWSSr algorithm
    • M Moradkhani, A Amiri, M Javaherian, H Safari, A hybrid algorithm for feature subset selection in high-dimensional datasets using FICA and IWSSr algorithm. Appl Soft Comput 35, 123–135 (2015)
    • (2015) Appl Soft Comput , vol.35 , pp. 123-135
    • Moradkhani, M.1    Amiri, A.2    Javaherian, M.3    Safari, H.4
  • 40
    • 40849099949 scopus 로고    scopus 로고
    • Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
    • C Xiang, P Yong, L Meng, Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recognit Lett 29(7), 918–924 (2008)
    • (2008) Pattern Recognit Lett , vol.29 , Issue.7 , pp. 918-924
    • Xiang, C.1    Yong, P.2    Meng, L.3
  • 43
    • 84869006945 scopus 로고    scopus 로고
    • Proceedings of the 2nd Symposium on Computational Intelligence for Security and Defence Applications(CISDA)
    • IEEE, Ottawa
    • M Tavallaee, E Bagheri, W Lu, A Ghorbani, Proceedings of the 2nd Symposium on Computational Intelligence for Security and Defence Applications(CISDA), in A detailed analysis of the KDD CUP 99 data set (IEEE, Ottawa, 2009), pp. 1–6
    • (2009) A detailed analysis of the KDD CUP 99 data set , pp. 1-6
    • Tavallaee, M.1    Bagheri, E.2    Lu, W.3    Ghorbani, A.4
  • 44
    • 84888375268 scopus 로고    scopus 로고
    • An in-depth analysis on traffic flooding attacks detection and system using data mining techniques
    • J Yu, H Kang, D Park, H Bang, D Kang, An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. J Syst Architect 59(10), 1005–1012 (2013)
    • (2013) J Syst Architect , vol.59 , Issue.10 , pp. 1005-1012
    • Yu, J.1    Kang, H.2    Park, D.3    Bang, H.4    Kang, D.5
  • 45
    • 84929620760 scopus 로고    scopus 로고
    • Evolving statistical rulesets for network intrusion detection
    • S Rastegari, P Hingston, C Lam, Evolving statistical rulesets for network intrusion detection. Appl Soft Comput 33, 348–359 (2015)
    • (2015) Appl Soft Comput , vol.33 , pp. 348-359
    • Rastegari, S.1    Hingston, P.2    Lam, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.