Two-steps feature selection for detection variant distributed denial of services attack in cloud environment

Kurniabudi Kurniabudi, Eko Arip Winanto, Sharipuddin Sharipuddin

Abstract


The prevalence of cloud computing among organizations poses a significant problem in ensuring security. Specifically, distributed denial of services (DDoS) attacks targeting cloud computing networks can lead to financial losses for consumers of cloud computing services. This assault has the potential to render cloud services inaccessible. The detection system serves as a remedy to prevent more substantial losses. This research aims to enhance the efficacy of the system detection model by integrating feature selection with three machine learning algorithms: decision tree (DT), random forest (RF), and naïve Bayes (NB). Therefore, our study suggests combining two phases of feature selection into the DDoS attack detection procedure. The first phase uses the information gain (IG) feature selection technique approach, and the second phase uses the principal component analysis (PCA) feature extraction approach. The technique is referred to as two-step feature selection. The test findings indicate that the implementation of two-step feature selection can enhance the performance of the DT and RF detection models by around 9%.

Keywords


Attack detection; Classification; DDoS; Feature selection; Machine learning

Full Text:

PDF


DOI: http://doi.org/10.11591/ijai.v14.i5.pp%25p

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Kurniabudi, Eko Arip Winanto, Sharipuddin

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

IAES International Journal of Artificial Intelligence (IJ-AI)
ISSN/e-ISSN 2089-4872/2252-8938 
This journal is published by the Institute of Advanced Engineering and Science (IAES).

View IJAI Stats