Research Article

Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning

Table 3

Comparison results of four algorithms for amplifying the normal flow.

The value of random multiplier
1.0–1.51.5–2.02.0–2.52.5–3.03.0–3.53.5–4.04.0–4.54.5–5.05.0–5.5

ADADM methodDR (%)78.9378.9378.9378.9378.9378.9378.9378.9378.93
FR (%)0.010.010.010.471.421.904.746.6410.43
ER (%)12.0212.0212.0212.2212.6312.8314.0514.8716.50

SimpleMKL methodDR (%)77.1477.1477.1477.1477.1477.1477.1477.1477.14
FR (%)0.010.010.471.424.276.6410.9017.0621.80
ER (%)13.0413.0413.2413.6514.8715.8917.7220.3722.40

SVM methodDR (%)77.8677.8677.8677.8677.8677.8677.8677.8677.86
FR (%)0.010.010.951.423.798.0611.8518.0122.75
ER (%)12.6312.6313.0413.2414.2616.0917.7220.3722.40

Nezhad et al.’s [16] methodDR (%)97.4997.1397.1397.1396.7796.7796.7796.7796.77
FR (%)65.2465.2466.1966.6766.6766.6767.1467.1467.62
ER (%)29.4729.6730.0830.2830.4930.4930.6930.6930.90