Denial of Service (DoS) is one of the common attempts in security hacking for making computation resources unavailable or to impair geographical networks. In this paper, we detect Denial of Service (DoS) attack from publicly available datasets using Logistic regression, Naive Bayes algorithm and artificial neural networks. The results from our experiments indicate that the accuracy, ROC curve and balanced accuracy of artificial neural network were higher than Naive Bayes algorithm and logistic regression for slightly imbalanced distribution dataset.
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms
Denial of Service (DoS) is one of the common attempts in security hacking for making computation resources unavailable or to impair geographical networks. In this paper, we detect Denial of Service (DoS) attack from publicly available datasets using Logistic regression, Naive Bayes algorithm and artificial neural networks. The results from our experiments indicate that the accuracy, ROC curve and balanced accuracy of artificial neural network were higher than Naive Bayes algorithm and logistic regression for slightly imbalanced distribution dataset.
- Award ID(s):
- 1723578
- Publication Date:
- NSF-PAR ID:
- 10273198
- Journal Name:
- Proc. of 18th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC)
- Page Range or eLocation-ID:
- 469-474
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Unmanned aerial vehicles (UAVs) must keep track of their location in order to maintain flight plans. Currently, this task is almost entirely performed by a combination of Inertial Measurement Units (IMUs) and reference to GNSS (Global Navigation Satellite System). Navigation by GNSS, however, is not always reliable, due to various causes both natural (reflection and blockage from objects, technical fault, inclement weather) and artificial (GPS spoofing and denial). In such GPS-denied situations, it is desirable to have additional methods for aerial geolocalization. One such method is visual geolocalization, where aircraft use their ground facing cameras to localize and navigate. Themore »
-
Modern vehicle is considered as a system vulnerable to attacks because it is connected to the outside world via a wireless interface. Although, connectivity provides more convenience and features to the passengers, however, it also becomes a pathway for the attackers targeting in-vehicle networks. Research in vehicle security is getting attention as in-vehicle attacks can impact human life safety as modern vehicle is connected to the outside world. Controller area network (CAN) is used as a legacy protocol for in-vehicle communication, However, CAN suffers from vulnerabilities due to lack of authentication, as the information about sender is missing in CANmore »
-
This paper presents a portable inertial measurement unit (IMU)-based motion sensing system and proposed an adaptive gait phase detection approach for non-steady state walking and multiple activities (walking, running, stair ascent, stair descent, squat) monitoring. The algorithm aims to overcome the limitation of existing gait detection methods that are time-domain thresholding based for steady-state motion and are not versatile to detect gait during different activities or different gait patterns of the same activity. The portable sensing suit is composed of three IMU sensors (wearable sensors for gait phase detection) and two footswitches (ground truth measurement and not needed for gaitmore »
-
Lighting, as a significant component of indoor environment quality, was found to be a primary contributor to deficient indoor environments in today’s workplace. This resulted from the fact that current guidelines are derived from empirical values and neglect the prevalence of computer-based tasks in current offices. A personal visual comfort model was designed to predict the degree of an individual’s visual comfort, as a way of evaluating the indoor lighting of the environment. Development of the model relied on experimental data, including individual eye pupil sizes, visual sensations, and visual satisfaction in response to various illuminance levels used for testsmore »