[9] Hosseini, S., Azizi, M. The Hybrid Technique
for DDoS Detection with Supervised Learning
Algorithms. Computer Networks, Vol. 158,
2019, pp. 35-45.
[10] Sharafaldin, I., Lashkari, A. H., Hakak, S.,
Ghorbani, A. A. Developing Realistic
Distributed Denial of Service (DDoS) Attack
Dataset and Taxonomy. In 2019 International
Carnahan Conference on Security Technology
(ICCST), IEEE, 2019, pp. 1-8.
[11] Nurwarsito, H., Nadhif, M. F. DDoS Attack
Early Detection and Mitigation System on SDN
using Random Forest Algorithm and Ryu
Framework. In 2021 8th International
Conference on Computer and Communication
Engineering (ICCCE), IEEE, 2021, pp. 178-
183.
[12] Bakker, J. N., Ng, B., Seah, W. K. Can
Machine Learning Techniques be Effectively
used in Real Networks against DDoS Attacks?.
In 2018 27th International Conference on
Computer Communication and Networks
(ICCCN), IEEE, 2018, pp. 1-6.
[13] Alkasassbeh, M., Al-Naymat, G., Hassanat, A.,
Almseidin, M. Detecting Distributed Denial of
Service Attacks using Data Mining Techniques.
International Journal of Advanced Computer
Science and Applications, Vol. 7, No. 1, 2016,
pp. 436-445.
[14] Kumar, P., Kumar, R., Gupta, G. P., Tripathi,
R. A Distributed Framework for Detecting
DDoS Attacks in Smart Contract‐based
Blockchain‐IoT Systems by Leveraging Fog
computing. Transactions on Emerging
Telecommunications Technologies, Vol. 32,
No. 6, 2021, e4112.
[15] Ustebay, S., Turgut, Z., Aydin, M. A. Intrusion
Detection System with Recursive Feature
Elimination by using Random Forest and Deep
Learning Classifier. In 2018 international
congress on big data, deep learning and
fighting cyber terrorism (IBIGDELFT), IEEE,
2018, pp. 71-76.
[16] Prasad, G., Sandhia, G. K., Sharma, A. Mobile
Application based Detection of DDoS Attack
with Enhanced Random Forest Algorithm.
Turkish Journal of Physiotherapy and
Rehabilitation, Vol. 32, No. 3, 2021, pp. 3263-
3271.
[17] Nandi, S., Phadikar, S., Majumder, K.
Detection of DDoS Attack and Classification
using a Hybrid Approach. In 2020 Third ISEA
Conference on Security and Privacy (ISEA-
ISAP), IEEE, 2020, pp. 41-47.
[18] Kerim, B. Securing IoT Network against DDoS
Attacks using Multi-agent IDS. In Journal of
Physics: Conference Series, IOP Publishing,
Vol. 1898, No. 1, p. 012033, 2021.
[19] Gaur, V., Kumar, R. Analysis of Machine
Learning Classifiers for Early Detection of
DDoS Attacks on IoT Devices. Arabian
Journal for Science and Engineering, 2021, pp.
1-22.
[20] Osorio, J. S. M., Tejada, J. A. V., Vega, J. F. B.
Detection of DoS/DDoS Attacks: the UBM and
GMM Approach. In 2021 IFIP/IEEE
International Symposium on Integrated
Network Management (IM), IEEE, 2021, pp.
866-871.
[21] Koroniotis, N., Moustafa, N., Sitnikova, E.,
Turnbull, B., Towards the Development of
Realistic Botnet Dataset in the Internet of
Things for Network Forensic Analytics: Bot-
IoT dataset. Future Generation Computer
Systems, Vol. 100, November 2019, pp. 779-
796.
[22] Jolliffe, I. T. Principal Component Analysis.
Springer Series in Statistics. New York,
Springer-Verlag, 2002.
[23] Cutler, A., Cutler, D. R., & Stevens, J. R.
(2012). Random forests. In Ensemble machine
learning (pp. 157-175). Springer, Boston, MA.
[24] Breiman, L. Random Forests. Machine
learning, Vol. 45, No. 1, 2001, pp. 5-32.
[25] Random Forest, Orange Visual Programming,
https://orange3.readthedocs.io/projects/orange-
visual-
programming/en/latest/widgets/model/randomf
orest.html, last accessed on August 12th, 2021.
[26] Test and Score, Widgets,
https://orangedatamining.com/widget-
catalog/evaluate/testandscore/, last accessed on
August 12th, 2021.
[27] Guerra-Manzanares, A., Medina-Galindo, J.,
Bahsi, H., Nõmm, S. MedBIoT: Generation of
an IoT Botnet Dataset in a Medium-sized IoT
Network. In International Conference on
Information Systems Security and Privacy
ICISSP 2020, 2020, pp. 207-218.
[28] Robinson, R. R., & Thomas, C. Ranking of
machine learning algorithms based on the
performance in classifying DDoS attacks.
In 2015 IEEE Recent Advances in Intelligent
Computational Systems (RAICS), IEEE, 2015,
pp. 185-190.
[29] Bandara, K. R. W. V., Abeysinghe, T., Hijaz,
A., Darshana, D. G. T., Aneez, H.,
Kaluarachchi, S. J., Sulochana, K. V. D. L.,
DhishanDhammearatchi, M. Preventing DDOS
WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS
DOI: 10.37394/23209.2022.19.4
Vanya Ivanova
Tasho Tashev, Ivo Draganov