A review on statistical approaches for anomaly detection in DDoS attacks
M Nooribakhsh, M Mollamotalebi - Information Security Journal: A …, 2020 - Taylor & Francis
ABSTRACT Distributed Denial-of-Service (DDoS) attack is one of the most common and
effective type of attacks aiming to deny or weaken the service providing of its victim (s). The …
effective type of attacks aiming to deny or weaken the service providing of its victim (s). The …
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made
it a destructive weapon of attackers which can disrupt the services of any network including …
it a destructive weapon of attackers which can disrupt the services of any network including …
Intrusion detection system for iot-based healthcare intrusions with lion-salp-swarm-optimization algorithm: metaheuristic-enabled hybrid intelligent approach
N Goswami, S Raj, D Thakral… - Engineered …, 2023 - espublisher.com
Abstract The Internet of Things (IoT) makes IoT devices more vulnerable to cyberattacks,
especially Distributed Denial of Service (DDoS), raising privacy and security issues …
especially Distributed Denial of Service (DDoS), raising privacy and security issues …
Predictive machine learning-based integrated approach for DDoS detection and prevention
Abstract Distributed Denial of Service attack has been a huge threat to the Internet and may
carry extreme losses to systems, companies, and national security. The invader can …
carry extreme losses to systems, companies, and national security. The invader can …
Identification of distributed denial of services anomalies by using combination of entropy and sequential probabilities ratio test methods
One of the most dangerous kinds of attacks affecting computers is a distributed denial of
services (DDoS) attack. The main goal of this attack is to bring the targeted machine down …
services (DDoS) attack. The main goal of this attack is to bring the targeted machine down …
A hybrid modified grasshopper optimization algorithm and genetic algorithm to detect and prevent DDoS attacks
S Mohammadi, M Babagoli - International Journal of Engineering, 2021 - ije.ir
Cybersecurity has turned into a brutal and vicious environment due to the expansion of
cyber-threats and cyberbullying. Distributed Denial of Service (DDoS) is a network menace …
cyber-threats and cyberbullying. Distributed Denial of Service (DDoS) is a network menace …
Intrusion detection system based on the beetle swarm optimization and K‐RMS clustering algorithm
SG Pran, S Raja, S Jeyasudha - International Journal of …, 2024 - Wiley Online Library
Intrusion detection is a cyber‐security method that is significant for network security. It is
utilized to detect behaviors that compromise security and privacy within a network or in the …
utilized to detect behaviors that compromise security and privacy within a network or in the …
Feature Selection to Enhance DDoS Detection Using Hybrid N-Gram Heuristic Techniques
Various forms of distributed denial of service (DDoS) assault systems and servers, including
traffic overload, request overload, and website breakdowns. Heuristic-based DDoS attack …
traffic overload, request overload, and website breakdowns. Heuristic-based DDoS attack …
A Review: DDoS Attack Detection Using Clustering Algorithms
AK Mishra, S Thapliyal, J Siddiqui… - … and Data Sciences …, 2024 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks pose a substantial threat to the stability and
security of networked systems by disrupting server replies and services. Their popularity …
security of networked systems by disrupting server replies and services. Their popularity …
Twin security model—a machine learning-based approach for DDoS attack detection in SDN
S Singh, SKV Jayakumar - … and Signal Processing: Proceedings of 2nd …, 2020 - Springer
In the world of emerging network technologies, the software-defined network (SDN)
architecture provides the global view of the entire network. Its agility and directly …
architecture provides the global view of the entire network. Its agility and directly …