Review of recent detection methods for HTTP DDoS attack

GA Jaafar, SM Abdullah, S Ismail - Journal of Computer …, 2019 - Wiley Online Library
With increment in dependency on web technology, a commensurate increase has been
noted in destructive attempts to disrupt the essential web technologies, hence leading to …

Intrusion Detection System with SVM and Ensemble Learning Algorithms

K Johnson Singh, D Maisnam, US Chanu - SN Computer Science, 2023 - Springer
One of the most effective methods of training a model for intrusion detection requires a very
good selection of features from the data and efficient and robust training algorithms to …

Blockchain based confidentiality and integrity preserving scheme for enhancing e-commerce security

JR Shaikh, G Iliev - 2018 IEEE Global Conference on Wireless …, 2018 - ieeexplore.ieee.org
In recent years, Electronic Commerce (E-commerce) applications are attracting many users
and merchants to conduct their daily business online which includes payment of bills, online …

[PDF][PDF] Detecting the onset of a network layer dos attack with a graph-based approach

R Paudel, P Harlan, W Eberle - The thirty-second international flairs …, 2019 - cdn.aaai.org
A denial-of-service (DoS) attack is a malicious act with the goal of interrupting the access to
a computer network. The result of DoS attack can cause the computers on the network to …

Convolutional neural network-based automatic diagnostic system for AL-DDoS attacks detection

FJ Abdullayeva - International Journal of Cyber Warfare and …, 2022 - igi-global.com
Distributed denial of service (DDoS) attacks are one of the main threats to information
security. The purpose of DDoS attacks at the network (IP) and transport (TCP) layers is to …

A Comprehensive Study of DDoS Attack on Internet of Things Network

N Anand, KJ Singh - International Conference on Science, Technology …, 2023 - Springer
In relation to each IoT layer, this paper examines DoS/DDoS attacks as well as security
measures. It demonstrates how different vulnerabilities in every tier can be used by …

Intrusion Detection System Using Supervised Machine Learning

S Kumar, KJ Singh - International Conference on Science, Technology …, 2023 - Springer
The whole world is joining the Internet because our world is moving toward digitalization.
Internet/networks are significant today on the planet; information security has turned into a …

An Efficient Intrusion Detection System Using Feature Selection and Long Short-Term Memory (LSTM)

HS Sharma, KJ Singh - International Conference on Science, Technology …, 2023 - Springer
As the number of services available over the Internet increases, the network infrastructure
becomes more vulnerable to malicious cyber threats. To address such issues, various …

[PDF][PDF] ENHANCED HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE DETECTION SCHEME WITH GET HEADERS ADOPTION

AG JAAFAR - 2020 - eprints.utm.my
ABSTRACT A transaction between a user and a web server involves several layers that are
known as Open Systems Interconnection (OSI) layers. The application layer is the highest …

[PDF][PDF] DETECTING THE INCEPTION OF A NETWORK LAYER DOS ATTACK WITH A GRAPH-BASED APPROACH

R Paudel, P Harlan, W Eberle - rpaudel42.github.io
■ Denial of Service (DOS) attack: malicious act with the goal of interrupting the access to a
computer network.■ Motivation: include but are not limited to revenge, prestige, politics, or …