Research Article

Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning

Table 1

Comparison results of four algorithms for scaling attack flow and normal flow.

The value of the random multiplier
0.6–0.70.7–0.80.8–0.90.9–1.11.0–1.51.5–2.02.0–3.03.0–4.04.0–5.0

ADADM methodDR (%)78.5778.5778.5778.5778.2178.2178.2178.2178.57
FR (%)0.010.010.010.010.010.010.010.010.01
ER (%)12.2212.2212.2212.2212.4212.4212.4212.4212.22

SimpleMKL methodDR (%)76.4376.4376.4376.4376.4376.4376.4376.4376.43
FR (%)0.010.010.010.010.010.010.010.010.01
ER (%)13.4413.4413.4413.4413.4413.4413.4413.4413.44

SVM methodDR (%)77.5077.5077.8677.8676.7977.5077.8676.7977.86
FR (%)0.010.010.010.010.010.010.010.010.01
ER (%)12.8312.8312.6312.6313.2412.8312.6313.2412.63

Nezhad et al.’s [16] methodDR (%)98.2197.8598.2197.8598.2198.2198.2197.8598.21
FR (%)74.2974.7674.2974.7675.7174.2974.2974.2972.38
ER (%)32.9233.3332.9233.3333.5432.9232.9233.1332.11