LSTM-based collaborative source-side DDoS attack detection
As denial of service attacks become more sophisticated, the source-side detection
techniques are being studied to solve the limitations of target-side detection techniques such …
techniques are being studied to solve the limitations of target-side detection techniques such …
Source-side DoS attack detection with LSTM and seasonality embedding
As the denial of service attacks become sophisticated, source-side detection methods are
being studied to address the limitation of target-side detection methods such as delayed …
being studied to address the limitation of target-side detection methods such as delayed …
Improving performance of collaborative source-side ddos attack detection
Recently, as the threat of Distributed Denial-of-Service attacks exploiting IoT devices has
spread, source-side Denial-of-Service attack detection methods are being studied in order to …
spread, source-side Denial-of-Service attack detection methods are being studied in order to …
Blockchain security in virtual environment
R Anand - Journal of Intelligent & Fuzzy Systems, 2022 - content.iospress.com
This paper is to improve the privacy and security in the distributed virtual environment using
blockchain technology. One of the feature it provides is greater security in the decentralized …
blockchain technology. One of the feature it provides is greater security in the decentralized …
Graph convolutional network based link state prediction
Because of the activation of IoT (Internet of Things) devices due to the rapid development of
recent communication technology, network traffic is currently fluctuating and increasing …
recent communication technology, network traffic is currently fluctuating and increasing …
A Novel Wireless Capacity Prediction Algorithm Based on GCN-GRU Combining Surrogate Model-based Optimization
Y Zhao, H Gao, H Wang, L Yu… - 2024 8th International …, 2024 - ieeexplore.ieee.org
The rapid advancement of wireless networks makes it crucial for base stations to possess
self-management and active adjustment capabilities. Accurate prediction of wireless network …
self-management and active adjustment capabilities. Accurate prediction of wireless network …
[PDF][PDF] Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack.
S Shunmuganathan… - Comput. Syst. Sci …, 2023 - pdfs.semanticscholar.org
The exponential advancement in telecommunication embeds the Internet in every aspect of
communication. Interconnections of networks all over the world impose monumental risk on …
communication. Interconnections of networks all over the world impose monumental risk on …
[PDF][PDF] 통계적가중치를이용한협력형소스측DDoS 공격탐지기법성능평가
염성웅, 김경백 - 네트워크트래픽입출량분석을통한네트워크 … - kyungbaekkim.jnu.ac.kr
요 약최근 보안이 취약한 IoT 장치를 악용하는 분산 서비스 거부 공격의 위협이 확산됨에 따라
신속하게 공격을 탐지하고 공격자의 위치를 찾기 위해 소스측 서비스 거부 공격 탐지 연구가 …
신속하게 공격을 탐지하고 공격자의 위치를 찾기 위해 소스측 서비스 거부 공격 탐지 연구가 …
[PDF][PDF] 협력형소스측서비스거부공격탐지기법연구
염성웅, 김경백 - 한국통신학회학술대회논문집, 2019 - kyungbaekkim.jnu.ac.kr
요 약최근 IoT 의 활성화에 따라 IoT 기기를 악용하는 분산 서비스 거부 공격 위협이 급격히
증가하고 있다. 이에 따라, IoT 환경이 구축된 소스측 네트워크에서 발생하는 트래픽을 분석하여 …
증가하고 있다. 이에 따라, IoT 환경이 구축된 소스측 네트워크에서 발생하는 트래픽을 분석하여 …