LSTM-based collaborative source-side DDoS attack detection

S Yeom, C Choi, K Kim - IEEE Access, 2022 - ieeexplore.ieee.org
As denial of service attacks become more sophisticated, the source-side detection
techniques are being studied to solve the limitations of target-side detection techniques such …

Source-side DoS attack detection with LSTM and seasonality embedding

S Yeom, C Choi, K Kim - Proceedings of the 36th annual ACM …, 2021 - dl.acm.org
As the denial of service attacks become sophisticated, source-side detection methods are
being studied to address the limitation of target-side detection methods such as delayed …

Improving performance of collaborative source-side ddos attack detection

S Yeom, K Kim - 2020 21st Asia-Pacific Network Operations …, 2020 - ieeexplore.ieee.org
Recently, as the threat of Distributed Denial-of-Service attacks exploiting IoT devices has
spread, source-side Denial-of-Service attack detection methods are being studied in order to …

Blockchain security in virtual environment

R Anand - Journal of Intelligent & Fuzzy Systems, 2022 - content.iospress.com
This paper is to improve the privacy and security in the distributed virtual environment using
blockchain technology. One of the feature it provides is greater security in the decentralized …

Graph convolutional network based link state prediction

S Yeom, C Choi, SS Kolekar… - 2021 22nd Asia-Pacific …, 2021 - ieeexplore.ieee.org
Because of the activation of IoT (Internet of Things) devices due to the rapid development of
recent communication technology, network traffic is currently fluctuating and increasing …

A Novel Wireless Capacity Prediction Algorithm Based on GCN-GRU Combining Surrogate Model-based Optimization

Y Zhao, H Gao, H Wang, L Yu… - 2024 8th International …, 2024 - ieeexplore.ieee.org
The rapid advancement of wireless networks makes it crucial for base stations to possess
self-management and active adjustment capabilities. Accurate prediction of wireless network …

[PDF][PDF] Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack.

S Shunmuganathan… - Comput. Syst. Sci …, 2023 - pdfs.semanticscholar.org
The exponential advancement in telecommunication embeds the Internet in every aspect of
communication. Interconnections of networks all over the world impose monumental risk on …

[PDF][PDF] 통계적가중치를이용한협력형소스측DDoS 공격탐지기법성능평가

염성웅, 김경백 - 네트워크트래픽입출량분석을통한네트워크 … - kyungbaekkim.jnu.ac.kr
요 약최근 보안이 취약한 IoT 장치를 악용하는 분산 서비스 거부 공격의 위협이 확산됨에 따라
신속하게 공격을 탐지하고 공격자의 위치를 찾기 위해 소스측 서비스 거부 공격 탐지 연구가 …

[PDF][PDF] 협력형소스측서비스거부공격탐지기법연구

염성웅, 김경백 - 한국통신학회학술대회논문집, 2019 - kyungbaekkim.jnu.ac.kr
요 약최근 IoT 의 활성화에 따라 IoT 기기를 악용하는 분산 서비스 거부 공격 위협이 급격히
증가하고 있다. 이에 따라, IoT 환경이 구축된 소스측 네트워크에서 발생하는 트래픽을 분석하여 …