Research Article

Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest

Table 1

Features of the CIDDS-001 dataset [13].

Feature Description

1. Src IP Source IP Address
2. Src Port Source Port
3. Dest IP Destination IP Address
4. Dest Port Destination Port
5. Proto Transport Protocol (e.g., ICMP, TCP, or UDP)
6. Date first seen Start time flow first seen
7. Duration Duration of the flow
8. Bytes Number of transmitted bytes
9. Packets Number of transmitted packets
10. Flags OR concatenation of all TCP Flags
11. Class Class label (normal, attacker, victim, suspicious or unknown)
12. AttackType Type of Attack (portScan, dos, bruteForce, — )
13. AttackID Unique attack id. All flows which belong to the same attack carry the same attack id.
14. Attack Description Provides additional information about the set attack parameters (e.g., the number of attempted password guesses for SSH-Brute-Force attacks)