Intelligent feature selection using particle swarm optimization algorithm with a decision tree for DDoS attack detection

(1) * Aween Abubakr Saeed Mail (Sulaimani Polytechnic University, Iraq)
(2) Noor Ghazi Mohammed Jameel Mail (Sulaimani Polytechnic University, Iraq)
*corresponding author

Abstract


The explosive development of information technology is increasingly rising cyber-attacks. Distributed denial of service (DDoS) attack is a malicious threat to the modern cyber-security world, which causes performance disruption to the network servers. It is a pernicious type of attack that can forward a large amount of traffic to damage one or all target’s resources simultaneously and prevents authenticated users from accessing network services. The paper aims to select the least number of relevant DDoS attack detection features by designing an intelligent wrapper feature selection model that utilizes a binary-particle swarm optimization algorithm with a decision tree classifier. In this paper, the Binary-particle swarm optimization algorithm is used to resolve discrete optimization problems such as feature selection and decision tree classifier as a performance evaluator to evaluate the wrapper model’s accuracy using the selected features from the network traffic flows. The model’s intelligence is indicated by selecting 19 convenient features out of 76 features of the dataset. The experiments were accomplished on a large DDoS dataset. The optimal selected features were evaluated with different machine learning algorithms by performance measurement metrics regarding the accuracy, Recall, Precision, and F1-score to detect DDoS attacks. The proposed model showed a high accuracy rate by decision tree classifier 99.52%, random forest 96.94%, and multi-layer perceptron 90.06 %. Also, the paper compares the outcome of the proposed model with previous feature selection models in terms of performance measurement metrics. This outcome will be useful for improving DDoS attack detection systems based on machine learning algorithms. It is also probably applied to other research topics such as DDoS attack detection in the cloud environment and DDoS attack mitigation systems.

Keywords


Distributed denial of service; Binary particle swarm optimization; Decision tree algorithm; Wrapper feature selection; Swarm intelligent

   

DOI

https://doi.org/10.26555/ijain.v7i1.553
      

Article metrics

Abstract views : 538 | PDF views : 106

   

Cite

   

Full Text

Download

References


[1] N. Bindra and M. Sood, "Detecting DDoS attacks using machine learning techniques and contemporary intrusion detection dataset," Autom. Control Comput. Sci., vol. 53, no. 5, pp. 419-428, 2019, doi: 10.3103/S0146411619050043.

[2] R. Saxena and S. Dey, "DDoS attack prevention using collaborative approach for cloud computing," Cluster Comput., pp. 1-16, 2019, doi: 10.1007/s10586-019-02994-2

[3] What Is an ACK Flood DDoS Attack? | Types of DDoS Attacks, 2020, available at: cloudflare.com

[4] Famous DDoS attacks | The largest DDoS attacks of all time, 2020, available at: cloudflare.com

[5] J. Weiss, "DDoS Detection Using Deep Neural Networks on Packet Flows", 2019, available at: http://www.cs.tufts.edu/comp/116/archive/fall2019/jweiss.pdf.

[6] S. Sarraf, "Analysis and Detection of DDoS Attacks Using Machine Learning Techniques," Am. Sci. Res. J. Eng. Technol. Sci., vol. 66, no. 1, pp. 95-104, 2020, Available at: Google Scholar

[7] Y. Gu, K. Li, Z. Guo, and Y. Wang, "Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm," IEEE Access, vol. 7, pp. 64351-64365, 2019, doi: 10.1109/ACCESS.2019.2917532

[8] Y. Li, T. Li, and H. Liu, "Recent advances in feature selection and its applications," Knowl. Inf. Syst., vol. 53, no. 3, pp. 551-577, 2017, doi: 10.1007/s10115-017-1059-8

[9] M. Mavrovouniotis, C. Li, and S. Yang, "A survey of swarm intelligence for dynamic optimization: Algorithms and applications," Swarm Evol. Comput., vol. 33, pp. 1-17, 2017, doi: 10.1016/j.swevo.2016.12.005.

[10] M. D. Prasad, V Prasanta Babu, and C. Amarnath. , "Machine Learning DDoS Detection Using Stochastic Gradient Boosting," Int. J. Comput. Sci. Eng., vol. 7, no. 4, pp. 157-16, 2019, doi: 10.26438/ijcse/v7i4.157166.

[11] A. Patil and D. Kshirsagar, "Towards feature selection for detection of DDoS attack," in Comput. Eng. Technol., 2020, pp. 215-223, doi: 10.1007/978-981-32-9515-5_21.

[12] F. S. d. Lima Filho, F. A. Silveira, A. de Medeiros Brito Junior, G. Vargas-Solar, and L. F. Silveira, "Smart detection: an online approach for DoS/DDoS attack detection using machine learning," Secur. Commun. Networks, vol. 2019, 2019, doi: 10.1155/2019/1574749.

[13] T. Mahjabin, Y. Xiao, G. Sun, and W. Jiang, "A survey of distributed denial-of-service attack, prevention, and mitigation techniques," Int. J. Distrib. Sens. Networks, vol. 13, no. 12, p. 1550147717741463, 2017, doi: 10.1177/1550147717741463.

[14] R. Jamar, A. Sogani, S. Mudgal, Y. Bhadra, and P. Churi, "E-shield: Detection and prevention of website attacks," in 2017 2nd IEEE Int. Conf. Recent Trends Electron. Inf. Commun. Technol., 2017, pp. 706-710: IEEE, doi: 10.1109/RTEICT.2017.8256689.

[15] Devendra, DDoS Dataset: DDoS Balanced & Unbalanced Datasets, 2019, available at: kaggle.com

[16] I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization," in ICISSP, 2018, pp. 108-116, doi: 10.5220/0006639801080116.

[17] H. H. Jazi, H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling," Comput. Networks, vol. 121, pp. 25-36, 2017, doi: 10.1016/j.comnet.2017.03.018.

[18] J. J. E. M. Geelan, http://virtualization. sys-con. com/node/612375, "Twenty one experts define cloud computing. Virtualization," 2008, Available at: Google Scholar

[19] F. Koumi, M. Aldasht, and H. Tamimi, "Efficient Feature Selection using Particle Swarm Optimization: A hybrid filters-wrapper Approach," in 2019 10th International Conference on Information and Communication Systems (ICICS), 2019, pp. 122-127: IEEE, doi: 10.1109/IACS.2019.8809133.

[20] L. Brezočnik, "Feature selection for classification using particle swarm optimization," in IEEE EUROCON 2017-17th International Conference on Smart Technologies, 2017, pp. 966-971: IEEE, doi: 10.1109/EUROCON.2017.8011255.

[21] S.Sandhiya and D. U. Palani, "A Novel Hybrid PSBCO Algorithm for Feature Selection," Int. J. Comput. Organ. Trends, vol. 10, no. 3, May-June 2020 2020, doi: 10.14445/22492593/IJCOT-V10I3P305.

[22] A. E. Hassanien and E. Emary, Swarm intelligence: principles, advances, and applications. CRC Press, 2018, doi: 10.1201/9781315222455

[23] L. Brezočnik, I. Fister, and V. Podgorelec, "Swarm intelligence algorithms for feature selection: a review," Appl. Sci., vol. 8, no. 9, p. 1521, 2018, doi: 10.3390/app8091521.

[24] R. Eberhart and J. Kennedy, "A new optimizer using particle swarm theory," in MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, 1995, pp. 39-43: IEEE, doi: 10.1109/MHS.1995.494215.

[25] J. Barrera and C. A. C. Coello, "A review of particle swarm optimization methods used for multimodal optimization," in Innovations in swarm intelligence: Springer, 2009, pp. 9-37, doi: 10.1007/978-3-642-04225-6_2.

[26] M. Mafarja, R. Jarrar, S. Ahmad, and A. A. Abusnaina, "Feature selection using binary particle swarm optimization with time varying inertia weight strategies," in Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018, pp. 1-9, doi: 10.1145/3231053.3231071.

[27] Y. Chen, L. Li, J. Xiao, Y. Yang, J. Liang, and T. Li, "Particle swarm optimizer with crossover operation," Eng. Appl. Artif. Intell., vol. 70, pp. 159-169, 2018, doi: 10.1016/j.engappai.2018.01.009.

[28] B. Xue, M. Zhang, and W. N. Browne, "New fitness functions in binary particle swarm optimisation for feature selection," in 2012 IEEE congress on evolutionary computation, 2012, pp. 1-8: IEEE, doi: 10.1109/CEC.2012.6256617.

[29] J. Kennedy and R. C. Eberhart, "A discrete binary version of the particle swarm algorithm," in 1997 IEEE International conference on systems, man, and cybernetics. Computational cybernetics and simulation, 1997, vol. 5, pp. 4104-4108: IEEE, doi: 10.1109/ICSMC.1997.637339.

[30] B. Tran, B. Xue, and M. Zhang, "Improved PSO for feature selection on high-dimensional datasets," in Asia-Pacific Conference on Simulated Evolution and Learning, 2014, pp. 503-515: Springer, doi: 10.1007/978-3-319-13563-2_43.

[31] S. M. Vieira, L. F. Mendonça, G. J. Farinha, and J. M. Sousa, "Modified binary PSO for feature selection using SVM applied to mortality prediction of septic patients," Appl. Soft Comput., vol. 13, no. 8, pp. 3494-3504, 2013, doi: 10.1016/j.asoc.2013.03.021.

[32] J. Too, A. R. Abdullah, N. Mohd Saad, and W. Tee, "EMG feature selection and classification using a Pbest-guide binary particle swarm optimization," Computation, vol. 7, no. 1, p. 12, 2019, doi: 10.3390/computation7010012.

[33] K. J. Singh and T. De, "Efficient classification of DDoS attacks using an ensemble feature selection algorithm," J. Intell. Syst., vol. 29, no. 1, pp. 71-83, 2017, doi: 10.1515/jisys-2017-0472.

[34] Y. S. Hussain, "Network Intrusion Detection for Distributed Denial-of-Service (DDoS) Attacks using Machine Learning Classification Techniques," 2020. Available at: https://dspace.library.uvic.ca/bitstream/handle/1828/11679/Hussain_Yasar%20Shahid_MEng_2020.pdf?sequence=3&isAllowed=y.

[35] Q. Niyaz, W. Sun, and A. Y. Javaid, "A deep learning based DDoS detection system in software-defined networking (SDN)," arXiv preprint arXiv:.07400, 2016, doi: 10.4108/eai.28-12-2017.153515.




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

___________________________________________________________
International Journal of Advances in Intelligent Informatics
ISSN 2442-6571  (print) | 2548-3161 (online)
Organized by Informatics Department - Universitas Ahmad Dahlan, and ASCEE Computer Society
Published by Universitas Ahmad Dahlan
W: http://ijain.org
E: ijain@uad.ac.id (paper handling issues)
    info@ijain.org, andri.pranolo.id@ieee.org (publication issues)

View IJAIN Stats

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0