A review on statistical approaches for anomaly detection in DDoS attacks

M Nooribakhsh, M Mollamotalebi - Information Security Journal: A …, 2020 - Taylor & Francis
ABSTRACT Distributed Denial-of-Service (DDoS) attack is one of the most common and
effective type of attacks aiming to deny or weaken the service providing of its victim (s). The …

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development

A Verma, R Saha, N Kumar, G Kumar - Multimedia Tools and Applications, 2022 - Springer
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …

Intrusion detection system for iot-based healthcare intrusions with lion-salp-swarm-optimization algorithm: metaheuristic-enabled hybrid intelligent approach

N Goswami, S Raj, D Thakral… - Engineered …, 2023 - espublisher.com
Abstract The Internet of Things (IoT) makes IoT devices more vulnerable to cyberattacks,
especially Distributed Denial of Service (DDoS), raising privacy and security issues …

Predictive machine learning-based integrated approach for DDoS detection and prevention

SD Kebede, B Tiwari, V Tiwari… - Multimedia Tools and …, 2022 - Springer
Abstract Distributed Denial of Service attack has been a huge threat to the Internet and may
carry extreme losses to systems, companies, and national security. The invader can …

Identification of distributed denial of services anomalies by using combination of entropy and sequential probabilities ratio test methods

BH Ali, N Sulaiman, SAR Al-Haddad, R Atan… - Sensors, 2021 - mdpi.com
One of the most dangerous kinds of attacks affecting computers is a distributed denial of
services (DDoS) attack. The main goal of this attack is to bring the targeted machine down …

A hybrid modified grasshopper optimization algorithm and genetic algorithm to detect and prevent DDoS attacks

S Mohammadi, M Babagoli - International Journal of Engineering, 2021 - ije.ir
Cybersecurity has turned into a brutal and vicious environment due to the expansion of
cyber-threats and cyberbullying. Distributed Denial of Service (DDoS) is a network menace …

Intrusion detection system based on the beetle swarm optimization and K‐RMS clustering algorithm

SG Pran, S Raja, S Jeyasudha - International Journal of …, 2024 - Wiley Online Library
Intrusion detection is a cyber‐security method that is significant for network security. It is
utilized to detect behaviors that compromise security and privacy within a network or in the …

Feature Selection to Enhance DDoS Detection Using Hybrid N-Gram Heuristic Techniques

A Maslan, KMB Mohamad, A Hamid… - … : International Journal on …, 2023 - joiv.org
Various forms of distributed denial of service (DDoS) assault systems and servers, including
traffic overload, request overload, and website breakdowns. Heuristic-based DDoS attack …

A Review: DDoS Attack Detection Using Clustering Algorithms

AK Mishra, S Thapliyal, J Siddiqui… - … and Data Sciences …, 2024 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks pose a substantial threat to the stability and
security of networked systems by disrupting server replies and services. Their popularity …

Twin security model—a machine learning-based approach for DDoS attack detection in SDN

S Singh, SKV Jayakumar - … and Signal Processing: Proceedings of 2nd …, 2020 - Springer
In the world of emerging network technologies, the software-defined network (SDN)
architecture provides the global view of the entire network. Its agility and directly …