A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …
it a destructive weapon of attackers which can disrupt the services of any network including …
Byte segment neural network for network traffic classification
Network traffic classification, which can map network traffic to protocols in the application
layer, is a fundamental technique for network management and security issues such as …
layer, is a fundamental technique for network management and security issues such as …
[PDF][PDF] Data mining techniques in DoS/DDoS attack detection: A literature review
BA Tama, KH Rhee - International Information Institute (Tokyo) …, 2015 - researchgate.net
This paper attempts to classify papers concerning DoS/DDoS attack detection using data
mining techniques. Thirty five papers were selected and carefully reviewed by authors from …
mining techniques. Thirty five papers were selected and carefully reviewed by authors from …
Application traffic classification at the early stage by characterizing application rounds
This article proposes a machine learning-based high-accuracy algorithm called “APPlication
Round method (APPR)” to identify network application traffic at the early stage. For each …
Round method (APPR)” to identify network application traffic at the early stage. For each …
DiffTREAT: Differentiated traffic scheduling based on RNN in data centers
Transmission schemes in data centers are supposed to accurately distinguish flow types for
different scheduling. However, prior efforts failed to meet the needs at all levels in a cost …
different scheduling. However, prior efforts failed to meet the needs at all levels in a cost …
Novel dynamic multiple classification system for network traffic
Traffic classification has been widely used in networking and security issues. Previous works
have involved many different techniques for mapping traffic to the application. However, little …
have involved many different techniques for mapping traffic to the application. However, little …
[图书][B] Multi-fractal traffic and anomaly detection in computer communications
M Li - 2022 - taylorfrancis.com
This book provides a comprehensive theory of mono-and multi-fractal traffic, including the
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …
[PDF][PDF] Enhancing DDoS flood attack detection via intelligent fuzzy logic
Z Xia, S Lu, J Li, J Tang - Informatica, 2010 - informatica.si
Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic Page 1 Informatica 34 (2010)
497-507 497 Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic Zhengmin …
497-507 497 Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic Zhengmin …
Long-range dependence and self-similarity of teletraffic with different protocols at the large time scale of day in the duration of 12 years: Autocorrelation modeling
M Li - Physica Scripta, 2020 - iopscience.iop.org
Teletraffic (traffic in short) modeling is crucial in the analysis and design of the infrastructure
of cyber-physical network systems from a view of traffic engineering. However, reports …
of cyber-physical network systems from a view of traffic engineering. However, reports …
Method and apparatus for network anomaly detection
PR Barford, JT Kline, S Nam, DJ Plonka… - US Patent …, 2017 - Google Patents
A network anomaly detector evaluates two complementary measurements of network
statistics, a time variation and correlation among those statistics, to provide an extremely …
statistics, a time variation and correlation among those statistics, to provide an extremely …