A Prevalent Model-based on Machine Learning for Identifying DRDoS Attacks through Features Optimization Technique
Growing apprehension among internet users regarding cyber-security threats, particularly
Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue …
Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue …
[PDF][PDF] A Prevalent Model-based on Machine Learning for Identifying DRDoS Attacks through Features Optimization Technique
MSIK Pabon Shaha, A Rahman, MM Hossain… - 2024 - researchgate.net
Growing apprehension among internet users regarding cyber-security threats, particularly
Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue …
Distributed Reflective Denial of Service (DRDoS) attacks, underscores a pressing issue …
Adaptive Safety and Cyber Security for Connected and Automated Vehicle System
H Chen - 2021 - hammer.purdue.edu
This dissertation discussed the potential benefits that CAV systems can bring to the general
well-being, and how the threat lies within the CAV system can affect its performance and …
well-being, and how the threat lies within the CAV system can affect its performance and …
Swarm Based Architecture for Defense Against Stealthy Attacks in Mobile Ad Hoc Network.
In mobile adhoc networks (MANET), stealthy attack, which is a collection of four different
attacks such as misrouting, identity delegation, power control and colluding collision, can …
attacks such as misrouting, identity delegation, power control and colluding collision, can …
Secured Cloud System Using Deep Learning
SB Kumar, K Mukherjee, RK Dwivedi - Computational Intelligence in …, 2020 - Springer
The cutting edge technology cloud provides services for end users based on pay-as-use
model. Cloud computing can provide immense services like unlimited storage capacity …
model. Cloud computing can provide immense services like unlimited storage capacity …
Support vector machine and fuzzy-based intrusion detection and prevention for attacks in MANETs
AA Lakshmi, KR Valluvan - International Journal of Mobile …, 2015 - inderscienceonline.com
In mobile ad hoc networks, the isolation of critical routing nodes may affect the routes and re-
routing that result in significant routing disruption. This in turn degrades the network …
routing that result in significant routing disruption. This in turn degrades the network …
[PDF][PDF] Detecting DRDoS attack by Log File based IP pairing mechanism
PM Priya, V Akilandeswari… - WSEAS TRANSACTIONS …, 2014 - academia.edu
As the number of security threats and attacks increase the need for developing flexible and
automated network security mechanism also increase. The main objective of this paper is to …
automated network security mechanism also increase. The main objective of this paper is to …
Distributed agent-based detection system using PSO and neural network for MANET
RK Cherian, AS Nargunam - International Journal of Mobile …, 2016 - inderscienceonline.com
Due to dynamic and infrastructure less nature of mobile adhoc network, it is prone to various
kinds of attacks. In this paper, we have proposed a distributed agent-based detection system …
kinds of attacks. In this paper, we have proposed a distributed agent-based detection system …
An Integrated Approach of E-RED and ANT Classification Methods for DRDoS Attacks
P MohanaPriya, V Akilandeswari, G Akilarasu… - Security in Computing …, 2014 - Springer
The main objective of this paper is to detect the Distributed Reflector Denial of Service
(DRDoS) attack based on a protocol independent based detection technique. The proposed …
(DRDoS) attack based on a protocol independent based detection technique. The proposed …
[图书][B] Malicious Attacks Detection in Wireless ad hoc Networks
A Ranjan - 2017 - search.proquest.com
The network intrusion detection is a system whose primary role is to recognize the attacks on
the network. The term network represents interconnection between two nodes via wire or …
the network. The term network represents interconnection between two nodes via wire or …