z-logo
open-access-imgOpen Access
Impact of Feature Selection Methods on Machine Learning-based for Detecting DDoS Attacks : Literature Review
Author(s) -
Muhammad Nur Faiz,
Oman Somantri,
Abdul Rohman Supriyono,
Arif Wirawan Muhammad
Publication year - 2022
Publication title -
jite (journal of informatics and telecommunication engineering)
Language(s) - English
Resource type - Journals
eISSN - 2549-6255
pISSN - 2549-6247
DOI - 10.31289/jite.v5i2.6112
Subject(s) - denial of service attack , computer science , feature selection , feature (linguistics) , process (computing) , machine learning , computer security , artificial intelligence , complement (music) , data science , world wide web , the internet , linguistics , philosophy , biochemistry , chemistry , complementation , gene , phenotype , operating system
Cybersecurity attacks are becoming increasingly sophisticated and increasing with the development of technology so that they present threats to both the private and public sectors, especially Denial of Service (DoS) attacks and their variants which are often known as Distributed Denial of Service (DDoS). One way to minimize this attack is by using traditional mitigation solutions such as human-assisted network traffic analysis techniques but experiencing some limitations and performance problems. To overcome these limitations, Machine Learning (ML) has become one of the main techniques to enrich, complement and enhance the traditional security experience. The way ML works are based on the process of data collection, training and output. ML is influenced by several factors, one of which is feature engineering. In this study, we focus on the literature review of several recent studies which show that the feature selection process greatly impacts the level of accuracy of this ML. Datasets such as KDD, UNSW-NB15 and others also affect the level of accuracy of ML. Based on this literature review, this study can observe several feature engineering strategies with relevant impacts that can be chosen to improve ML solutions on DDoS attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here