The curse of dimensionality, due to lots of network-traffic attributes, has a negative impact on machine learning algorithms in detecting distributed denial of service (DDoS) attacks. This study investigated whether adding the filter and wrapper methods, preceded by combined clustering algorithms using the Vote classifier method, was effective in lowering the false-positive rates of DDoS-attack detection methods. We examined this process to address the curse of dimensionality of machine learning algorithms in detecting DDoS attacks. The results of this study, using ANOVA statistical analyses, showed that incorporating the wrapper method had superior performance in comparison with the filter and clustering methods. IT professionals aim at in...
The security of the internet is seriously threatened by a distributed denial of service (DDoS) attac...
Distributed Denial of Service (DDoS) attacks are very common nowadays. It is evident that the curre...
Distributed Denial of Service (DDoS) attacks pose an increasing threat to the current internet. The ...
Distributed Denial of Service (DDoS) has been the most prominent attack in cyber-physical system ove...
Distributed denial of service (DDoS) attack detection methods based on the clustering method are ine...
Distributed Denial of Services (DDoS) attack, one of the most dangerous types of cyber attack, has b...
Attacks known as distributed denial of service (DDoS) compromise user privacy while disrupting inter...
Distributed Denial of Service (DDoS) attacks have been the prominent attacks over the last decade. A...
Network attacks of the distributed denial of service (DDoS) form are used to disrupt server replies ...
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government ...
High and low-intensity attacks are two common Distributed Denial of Service (DDoS) attacks that disr...
The rapid growth of IoT, smart devices, and 5G networks has increased the prevalence and complexity ...
Distributed Denial of Service (DDoS) attacks disrupt global network services by mainly overwhelming ...
A Distributed Denial of Service (DDoS) attack is a major threat to cyber security. It originates fro...
The threat of a Distributed Denial of Service (DDoS) attack on web-based services and applications i...
The security of the internet is seriously threatened by a distributed denial of service (DDoS) attac...
Distributed Denial of Service (DDoS) attacks are very common nowadays. It is evident that the curre...
Distributed Denial of Service (DDoS) attacks pose an increasing threat to the current internet. The ...
Distributed Denial of Service (DDoS) has been the most prominent attack in cyber-physical system ove...
Distributed denial of service (DDoS) attack detection methods based on the clustering method are ine...
Distributed Denial of Services (DDoS) attack, one of the most dangerous types of cyber attack, has b...
Attacks known as distributed denial of service (DDoS) compromise user privacy while disrupting inter...
Distributed Denial of Service (DDoS) attacks have been the prominent attacks over the last decade. A...
Network attacks of the distributed denial of service (DDoS) form are used to disrupt server replies ...
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government ...
High and low-intensity attacks are two common Distributed Denial of Service (DDoS) attacks that disr...
The rapid growth of IoT, smart devices, and 5G networks has increased the prevalence and complexity ...
Distributed Denial of Service (DDoS) attacks disrupt global network services by mainly overwhelming ...
A Distributed Denial of Service (DDoS) attack is a major threat to cyber security. It originates fro...
The threat of a Distributed Denial of Service (DDoS) attack on web-based services and applications i...
The security of the internet is seriously threatened by a distributed denial of service (DDoS) attac...
Distributed Denial of Service (DDoS) attacks are very common nowadays. It is evident that the curre...
Distributed Denial of Service (DDoS) attacks pose an increasing threat to the current internet. The ...