A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development

A Verma, R Saha, N Kumar, G Kumar - Multimedia Tools and Applications, 2022 - Springer
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …

Byte segment neural network for network traffic classification

R Li, X Xiao, S Ni, H Zheng, S Xia - 2018 IEEE/ACM 26th …, 2018 - ieeexplore.ieee.org
Network traffic classification, which can map network traffic to protocols in the application
layer, is a fundamental technique for network management and security issues such as …

[PDF][PDF] Data mining techniques in DoS/DDoS attack detection: A literature review

BA Tama, KH Rhee - International Information Institute (Tokyo) …, 2015 - researchgate.net
This paper attempts to classify papers concerning DoS/DDoS attack detection using data
mining techniques. Thirty five papers were selected and carefully reviewed by authors from …

Application traffic classification at the early stage by characterizing application rounds

NF Huang, GY Jai, HC Chao, YJ Tzang, HY Chang - Information Sciences, 2013 - Elsevier
This article proposes a machine learning-based high-accuracy algorithm called “APPlication
Round method (APPR)” to identify network application traffic at the early stage. For each …

DiffTREAT: Differentiated traffic scheduling based on RNN in data centers

Z Wei, Q Li, K Zhu, J Zhou, L Zou… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Transmission schemes in data centers are supposed to accurately distinguish flow types for
different scheduling. However, prior efforts failed to meet the needs at all levels in a cost …

Novel dynamic multiple classification system for network traffic

X Xiao, R Li, HT Zheng, R Ye, A KumarSangaiah… - Information …, 2019 - Elsevier
Traffic classification has been widely used in networking and security issues. Previous works
have involved many different techniques for mapping traffic to the application. However, little …

[图书][B] Multi-fractal traffic and anomaly detection in computer communications

M Li - 2022 - taylorfrancis.com
This book provides a comprehensive theory of mono-and multi-fractal traffic, including the
basics of long-range dependent time series and 1/f noise, ergodicity and predictability of …

[PDF][PDF] Enhancing DDoS flood attack detection via intelligent fuzzy logic

Z Xia, S Lu, J Li, J Tang - Informatica, 2010 - informatica.si
Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic Page 1 Informatica 34 (2010)
497-507 497 Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic Zhengmin …

Long-range dependence and self-similarity of teletraffic with different protocols at the large time scale of day in the duration of 12 years: Autocorrelation modeling

M Li - Physica Scripta, 2020 - iopscience.iop.org
Teletraffic (traffic in short) modeling is crucial in the analysis and design of the infrastructure
of cyber-physical network systems from a view of traffic engineering. However, reports …

Method and apparatus for network anomaly detection

PR Barford, JT Kline, S Nam, DJ Plonka… - US Patent …, 2017 - Google Patents
A network anomaly detector evaluates two complementary measurements of network
statistics, a time variation and correlation among those statistics, to provide an extremely …