Research Article

Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning

Table 2

Comparison results of four algorithms for narrowing the attack flow.

The value of the random multiplier
0.1–0.20.2–0.30.3–0.40.4–0.50.5–0.60.6–0.70.7–0.80.8–0.90.9–1.0

ADADM methodDR (%)78.2178.2178.2178.5778.5778.5778.5778.5778.57
FR (%)10.991.420.010.010.010.010.010.010.01
ER (%)17.1513.0412.4212.2212.2212.2212.2212.2212.22

SimpleMKL methodDR (%)75.7176.4376.4376.4376.4376.4376.4376.4376.43
FR (%)22.754.741.420.010.010.010.010.010.01
ER (%)23.6315.4814.0513.4413.4413.4413.4413.4413.44

SVM methodDR (%)76.0777.1477.5077.8677.5077.8677.8677.5077.86
FR(%)22.754.741.420.470.010.010.010.010.01
ER(%)23.4215.0713.4412.8312.8312.6312.6312.8312.63

Nezhad et al.’s [16] methodDR(%)97.1397.8598.5798.2198.5798.5798.2198.2197.85
FR(%)74.2974.2974.2974.2974.2974.2974.2974.2974.29
ER (%)33.5433.1332.7232.9232.7232.7232.9232.9233.13