<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Bilişim Teknolojileri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1307-9697</issn>
                                        <issn pub-type="epub">2147-0715</issn>
                                                                                            <publisher>
                    <publisher-name>Gazi Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17671/gazibtd.1002178</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>Dağıtılmış Hizmet Reddi Saldırılarını Algılamak için bir Metodoloji</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>A Methodology to Detect Distributed Denial of Service Attacks</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-0737-1966</contrib-id>
                                                                <name>
                                    <surname>Aslan</surname>
                                    <given-names>Ömer</given-names>
                                </name>
                                                                    <aff>SİİRT ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20220430">
                    <day>04</day>
                    <month>30</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>15</volume>
                                        <issue>2</issue>
                                        <fpage>149</fpage>
                                        <lpage>158</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20210929">
                        <day>09</day>
                        <month>29</month>
                        <year>2021</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20220218">
                        <day>02</day>
                        <month>18</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2008, Bilişim Teknolojileri Dergisi</copyright-statement>
                    <copyright-year>2008</copyright-year>
                    <copyright-holder>Bilişim Teknolojileri Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>Dağıtılmış hizmet reddi (Distributed denial of service- DDoS) saldırıları, sistemin kullanılabilirliğini hedef alarak normal kullanıcıların sisteme erişimini engelleyen en yıkıcı siber saldırılardandır. DDoS saldırılarından sadece bilgisayarlar değil, aynı zamanda çok sayıda akıllı telefon ve Nesnelerin İnterneti (IoT) cihazları da etkilenmektedir. DDoS saldırılarını etkili bir şekilde durduran veya önleyen iyi bilinen bir sistem yoktur. Düşük hesaplama yükü ile yüksek doğrulukta etkili bir DDoS tespit sistemi tasarlamak hala çok zorlu bir iştir. Bu makalede, DDoS saldırı türlerini tespit etmek ve sınıflandırmak için kullanılan bir yöntem önerilmiştir. Metodolojimiz üç bölümden oluşmaktadır: veri ön işleme, özellik seçimi ve sınıflandırma. Öncelikle modelimize uygun olmayan bazı özellikleri elimine etmek için veri ön işleme yapılmıştır. İkinci olarak, en önemli özellikler Bilgi Kazanımı, Kazanç Oranı, Korelasyon Katsayısı ve Relief algoritmaları kullanılarak seçilmiştir. Öznitelik sayısı 87&#039;den 20&#039;ye düşürülmüştür. Son olarak, çeşitli makine öğrenmesi algoritmaları kullanılarak normal ağ trafiği DDoS saldırılarından ayrıştırılmıştır. Ayrıca, DDoS saldırı türlerine göre de sınıflandırma yapılmıştır. Önerilen yöntem, CIC-DDoS2019 veri seti üzerinde test edilmiştir. Deneysel sonuçlar, önerilen yöntemin literatürdeki öncü yöntemlere göre daha iyi performans gösterdiğini doğrulamıştır.</p></trans-abstract>
                                                                                                                                    <abstract><p>Distributed denial of service (DDoS) attacks is one of the most destructive cyber attacks which target the availability of the system when legitimate users try to access the system. Not only computers, but also the growing number of smartphones as well as Internet of Things (IoT) devices are affected by DDoS attacks. There is no well-known system which effectively stops or prevents DDoS attacks. Designing an effective DDoS detector with high accuracy with low computational overhead is still a very challenging task. In this paper, a methodology, which is used to detect and classify the types of DDoS attacks, is proposed. Our methodology is divided into three parts: pre-processing, feature selection, and classification. First, pre-processing is performed to eliminate some features which are not suitable for our model. Second, most significant features are selected by using Information Gain, Gain Ratio, Correlation Coefficient, and Relief. We declined the number of features from 87 to 20. Finally, various classifiers are used to detect DDoS attacks from the bening ones. The proposed methodology is performed on the CIC-DDoS2019 dataset. The experimental results show that the proposed methodology performed pretty well when it is compared to leading methods in the literature.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Cyber attacks</kwd>
                                                    <kwd>  DDoS detection</kwd>
                                                    <kwd>  DDoS attacks</kwd>
                                                    <kwd>  DDoS detection</kwd>
                                                    <kwd>  DDoS attacks classification</kwd>
                                                    <kwd>  feature selection</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>siber saldırılar</kwd>
                                                    <kwd>  DDoS tespiti</kwd>
                                                    <kwd>  DDoS saldırılarının sınıflandırılması</kwd>
                                                    <kwd>  özellik seçimi</kwd>
                                                    <kwd>  makine öğrenmesi</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Ö. Aslan and R. Samet, “Mitigating cyber security attacks by being aware of vulnerabilities and bugs”, 2017 International Conference on Cyberworlds (CW), IEEE, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">İnternet: DDoS Evaluation Dataset (CIC-DDoS2019), https://www.unb.ca/cic/datasets/ddos-2019.html, 15.09.2021.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">S.N. Shiaeles, V. Katos, A.S. Karakos and B.K. Papadopoulos, “Real time DDoS detection using fuzzy estimators”, computers &amp; security 31.6 (2012): 782-790, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">M. Ozkan-Okay, R. Samet and Ö. Aslan, “A new feature selection approach and classification technique for current intrusion detection system”, IEEE 6th International Conference On Computer Science and Engineering (UBMK), 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">J. Han, P. Jian, and K. Micheline, “Data mining: concepts and techniques”, Elsevier, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">İnternet: A. Gupta, “Feature Selection Techniques in Machine Learning”, https://www.analyticsvidhya.com/blog/2020/10/feature-selection-techniques-in-machine-learning/, 1.1.2022.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">D. Aksu, S. Üstebay, M.A. Aydin and T. Atmaca, “Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm”, International symposium on computer and information sciences, Springer, Cham, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">T.H. Phyu and N.N Oo, “Performance comparison of feature selection methods”, MATEC web of conferences, EDP Sciences, 42, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">B. Zhang, T. Zhang and Z. Yu, “DDoS detection and prevention based on artificial intelligence techniques”, 3rd IEEE International Conference on Computer and Communications (ICCC), 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">R. Doshi, N. Apthorpe and N. Feamster, “Machine learning ddos detection for consumer internet of things devices”, IEEE Security and Privacy Workshops (SPW), 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">D. Yin, L. Zhang and K. Yang, “A DDoS attack detection and mitigation with software-defined Internet of Things framework”, IEEE Access 6 (2018): 24694-24705.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">F. A. F. Silveira, F. Lima-Filho, F. S. D. Silva, A. D. M. B. Junior and L. F. Silveira, “Smart detection-IoT: A DDoS sensor system for Internet of Things”, International Conference on Systems, Signals and Image Processing (IWSSIP), IEEE, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">J. Li, M. Liu, Z. Xue, X. Fan and X. He, “Rtvd: A real-time volumetric detection scheme for ddos in the internet of things,” IEEE Access 8 (2020): 36191-36201.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinez-del-Rincon and D. Siracusa, “LUCID: A practical, lightweight deep learning solution for DDoS attack detection”, IEEE Transactions on Network and Service Management, 17(2), 876-889, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">M. Asad, M. Asim, T. Javed, M.O. Beg, H. Mujtaba and S. Abbas, “Deepdetect: detection of distributed denial of service attacks using deep learning”, The Computer Journal, 63(7), 983-994, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Y. Wei, J. Jang-Jaccard, F. Sabrina, A. Singh, W. Xu and S. Camtepe, “Ae-mlp: A hybrid deep learning approach for ddos detection and classification”, IEEE Access, 9, 146810-146821, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">B. Gupta, A. Rawat, A. Jain, A. Arora and N. Dhami, “Analysis of various decision tree algorithms for classification in data mining”, Int. J. Comput. Appl, 163(8); 15-19, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">L. Breiman, “Random forests”, Machine learning 45(1); 5-32, 2001.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">S.K. Sankaralingam, N.S Nagarajan and A.S. Narmadha, “Energy aware decision stump linear programming boosting node classification based data aggregation in WSN”, Computer Communications, 155, 133-142, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">O. Kaynar, H. Arslan, Y. Görmez and Y.E. IŞIK, “Makine öğrenmesi ve öznitelik seçim yöntemleriyle saldırı tespiti”, Bilişim Teknolojileri Dergisi, 11(2), 175-185, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">A. H. Wahla, L. Chen, Y. Wang, R. Chen and F. Wu, “Automatic wireless signal classification in multimedia Internet of Things: An adaptive boosting enabled approach”, IEEE Access, 7,160334-160344, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Ö. Aslan and R. Samet and Ö. Ö. Tanrıöver, “Using a Subtractive Center Behavioral Model to Detect Malware”, Security and Communication Networks, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">E. Masum and R. Samet, “Mobil BOTNET İle DDOS Saldırısı”, Bilişim Teknolojileri Dergisi, 11(2), 111-121, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Ö. Aslan and S. Refik, “Investigation of possibilities to detect malware using existing tools”, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">R. Chaganti, D. Gupta and N. Vemprala, “Intelligent network layer for cyber-physical systems security”, International Journal of Smart Security Technologies (IJSST), 8(2), 42-58, 2021.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
