Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 4975343, 9 pages
https://doi.org/10.1155/2017/4975343
Research Article

A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning

1Information and Network Center, Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2School of CyberSpace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China

Correspondence should be addressed to Bin Jia; nc.ude.tpub@0102dq_bj

Received 22 October 2016; Accepted 11 January 2017; Published 15 March 2017

Academic Editor: Jun Bi

Copyright © 2017 Bin Jia et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Palmieri, S. Ricciardi, U. Fiore, M. Ficco, and A. Castiglione, “Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures,” The Journal of Supercomputing, vol. 71, no. 5, pp. 1620–1641, 2015. View at Publisher · View at Google Scholar · View at Scopus
  2. Q. Yan, F. R. Yu, Q. X. Gong, and J. Q. Li, “Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 602–622, 2016. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Luo, X. Yang, J. Wang, J. Xu, J. Sun, and K. Long, “On a mathematical model for low-rate shrew DDoS,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 7, pp. 1069–1083, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. P. Xiao, W. Y. Qu, H. Qi, and Z. Y. Li, “Detecting DDoS attacks against data center with correlation analysis,” Computer Communications, vol. 67, pp. 66–74, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Saied, R. E. Overill, and T. Radzik, “Detection of known and unknown DDoS attacks using artificial neural networks,” Neurocomputing, vol. 172, pp. 385–393, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. S. S. Mao, L. Xiong, L. C. Jiao, S. Zhang, and B. Chen, “Isomerous multiple classifier ensemble via transformation of the rotating forest,” Journal of Xidian University, vol. 41, no. 5, pp. 48–53, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. L. I. Kuncheva and C. J. Whitaker, “Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy,” Machine Learning, vol. 51, no. 2, pp. 181–207, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  8. J. J. Rodríguez, L. I. Kuncheva, and C. J. Alonso, “Rotation forest: a new classifier ensemble method,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 10, pp. 1619–1630, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. Z. L. Fu and X. H. Zhao, “Dynamic combination method of classifiers and ensemble learning algorithms based on classifiers Combination,” Journal of Sichuan University (Engineering Science Edition), vol. 43, no. 2, pp. 58–65, 2011. View at Google Scholar · View at Scopus
  10. L. I. Kuncheva, “That elusive diversity in classifier ensembles,” in Proceedings of the 1st Iberian Conference on Pattern Recognition and Image Analysis (ibPRIA '03), pp. 1126–1138, Springer, Mallorca, Spain, June 2003.
  11. L. I. Kuncheva and J. J. Rodríguez, “Classifier ensembles with a random linear oracle,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 4, pp. 500–508, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. J. F. Díez-Pastor, J. J. Rodríguez, C. García-Osorio, and L. I. Kuncheva, “Random balance: ensembles of variable priors classifiers for imbalanced data,” Knowledge-Based Systems, vol. 85, pp. 96–111, 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. L. Breiman, “Bagging predictors,” Machine Learning, vol. 24, no. 2, pp. 123–140, 1996. View at Google Scholar · View at Scopus
  14. L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  15. D. T. Larose, “k-nearest neighbor algorithm,” in Discovering Knowledge in Data: An Introduction to Data Mining, pp. 90–106, 2nd edition, 2005. View at Publisher · View at Google Scholar
  16. W. Wang, X. Zhang, S. Gombault, and S. J. Knapskog, “Attribute normalization in network intrusion detection,” in Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN '09), pp. 448–453, IEEE, Kaohsiung, Taiwan, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, “The 1999 DARPA off-line intrusion detection evaluation,” Computer Networks, vol. 34, no. 4, pp. 579–595, 2000. View at Publisher · View at Google Scholar · View at Scopus
  18. J. McHugh, “Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory,” ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 4, pp. 262–294, 2000. View at Publisher · View at Google Scholar
  19. K. C. Khor, C. Y. Ting, and S. Phon-Amnuaisuk, “A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection,” Applied Intelligence, vol. 36, no. 2, pp. 320–329, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. P. Prasenna, R. K. Kumar, A. V. T. R. Ramana, and A. Devanbu, “Network programming and mining classifier for intrusion detection using probability classification,” in Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME '12), pp. 204–209, IEEE, Tamilnadu, India, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. C. Bae, W. C. Yeh, M. A. M. Shukran, Y. Y. Chung, and T. J. Hsieh, “A novel anomaly-network intrusion detection system using ABC algorithms,” International Journal of Innovative Computing, Information and Control, vol. 8, no. 12, pp. 8231–8248, 2012. View at Google Scholar · View at Scopus
  22. C. Guo, Y. Zhou, Y. Ping, Z. Zhang, G. Liu, and Y. Yang, “A distance sum-based hybrid method for intrusion detection,” Applied Intelligence, vol. 40, no. 1, pp. 178–188, 2014. View at Publisher · View at Google Scholar · View at Scopus