DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications
A Praseed, PS Thilagam - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attacks are some of the most devastating attacks
against Web applications. A large number of these attacks aim to exhaust the network …
against Web applications. A large number of these attacks aim to exhaust the network …
Review of recent detection methods for HTTP DDoS attack
GA Jaafar, SM Abdullah, S Ismail - Journal of Computer …, 2019 - Wiley Online Library
With increment in dependency on web technology, a commensurate increase has been
noted in destructive attempts to disrupt the essential web technologies, hence leading to …
noted in destructive attempts to disrupt the essential web technologies, hence leading to …
LUCID: A practical, lightweight deep learning solution for DDoS attack detection
R Doriguzzi-Corin, S Millar… - … on Network and …, 2020 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's
Internet, disrupting the availability of essential services. The challenge of DDoS detection is …
Internet, disrupting the availability of essential services. The challenge of DDoS detection is …
A novel intrusion detection method based on lightweight neural network for internet of things
The purpose of a network intrusion detection (NID) is to detect intrusions in the network,
which plays a critical role in ensuring the security of the Internet of Things (IoT). Recently …
which plays a critical role in ensuring the security of the Internet of Things (IoT). Recently …
Machine learning-based IoT-botnet attack detection with sequential architecture
With the rapid development and popularization of Internet of Things (IoT) devices, an
increasing number of cyber-attacks are targeting such devices. It was said that most of the …
increasing number of cyber-attacks are targeting such devices. It was said that most of the …
[HTML][HTML] A dynamic MLP-based DDoS attack detection method using feature selection and feedback
M Wang, Y Lu, J Qin - Computers & Security, 2020 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is a stubborn network security problem.
Various machine learning-based methods have been proposed to detect such attacks …
Various machine learning-based methods have been proposed to detect such attacks …
Near real-time security system applied to SDN environments in IoT networks using convolutional neural network
Abstract The Internet of Things (IoT) paradigm brings new and promising possibilities for
services and products. The heterogeneity of IoT devices highlights the inefficiency of …
services and products. The heterogeneity of IoT devices highlights the inefficiency of …
Semi-supervised K-means DDoS detection method using hybrid feature selection algorithm
Y Gu, K Li, Z Guo, Y Wang - IEEE Access, 2019 - ieeexplore.ieee.org
Distributed denial of service (DDoS) attack is an attempt to make an online service
unavailable by overwhelming it with traffic from multiple sources. Therefore, it is necessary to …
unavailable by overwhelming it with traffic from multiple sources. Therefore, it is necessary to …
Application layer denial-of-service attacks and defense mechanisms: a survey
N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …
Security data collection and data analytics in the internet: A survey
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …
detect security threats and measure the security of the Internet arises a significant research …