Covert channel detection: machine learning approaches
MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …
made covert communications easier to construct, faster, undetectable and more secure than …
[PDF][PDF] Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm.
AHB Aighuraibawi, S Manickam, R Abdullah… - Comput. Syst. Sci …, 2023 - researchgate.net
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4× 1038 unique
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …
IP addresses of devices in the network. IPv6 has introduced new features like Neighbour …
[PDF][PDF] Q-learning based distributed denial of service detection
HS Yaseen, A Al-Saadi - International Journal of Electrical and Computer …, 2023 - core.ac.uk
Distributed denial of service (DDoS) attacks the target service providers by sending a huge
amount of traffic to prevent legitimate users from getting the service. These attacks become …
amount of traffic to prevent legitimate users from getting the service. These attacks become …
Efficient model for detecting application layer distributed denial of service attacks
MK Kareem, OD Aborisade, SA Onashoga… - Bulletin of Electrical …, 2023 - beei.org
The increasing advancement of technologies and communication infrastructures has been
posing threats to the internet services. One of the most powerful attack weapons for …
posing threats to the internet services. One of the most powerful attack weapons for …
Neighbor discovery protocol anomaly-based detection system using neural network algorithm
The exponential increase in Internet-facing devices in the last decade has resulted in IP
address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the …
address exhaustion due to the limitations of the existing IPv4 address space. Therefore, the …
Predicting DoS and DDoS attacks in network security scenarios using a hybrid deep learning model
AF Al-zubidi, AK Farhan, SM Towfek - Journal of Intelligent Systems, 2024 - degruyter.com
Network security faces increasing threats from denial of service (DoS) and distributed denial
of service (DDoS) attacks. The current solutions have not been able to predict and mitigate …
of service (DDoS) attacks. The current solutions have not been able to predict and mitigate …
[PDF][PDF] 'Improved heuristic framework for cyber security system on DDoS attack
R Ahuja, M Gupta - J. Data Acquisition Process, 2023 - sjcjycl.cn
Nowadays, networks have adopted the always-connected concept and as time goes on,
technology makes gadgets smaller and cheaper. This revolution lays the foundations for the …
technology makes gadgets smaller and cheaper. This revolution lays the foundations for the …
LMIPv6ATK: A Labeled dataset containing multiple ICMPV6-DDOS attacks
S Li, L Zhang, Y Han - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Distributed denial-of-service attacks using Internet Control Message Protocol version 6
messages can cause serious damage to IPV6 networks, resulting in huge economic losses …
messages can cause serious damage to IPV6 networks, resulting in huge economic losses …
DDoS Capability and Readiness-Evidence from Australian Organisations
A common perception of cyber defence is that it should protect systems and data from
malicious attacks, ideally keeping attackers outside of secure perimeters and preventing …
malicious attacks, ideally keeping attackers outside of secure perimeters and preventing …