Intelligent techniques for detecting network attacks: review and research directions
The significant growth in the use of the Internet and the rapid development of network
technologies are associated with an increased risk of network attacks. Network attacks refer …
technologies are associated with an increased risk of network attacks. Network attacks refer …
Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems
The increasing use of Industrial Internet of Things (IIoT) devices has heightened concerns
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …
about cybersecurity threats, particularly botnet attacks. Traditional internet communication …
[HTML][HTML] A dynamic MLP-based DDoS attack detection method using feature selection and feedback
M Wang, Y Lu, J Qin - Computers & Security, 2020 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is a stubborn network security problem.
Various machine learning-based methods have been proposed to detect such attacks …
Various machine learning-based methods have been proposed to detect such attacks …
Voting extreme learning machine based distributed denial of service attack detection in cloud computing
GS Kushwah, V Ranga - Journal of Information Security and Applications, 2020 - Elsevier
Distributed denial of service attack is one of the most dangerous attacks in cloud computing.
This attack makes the cloud services inaccessible to the end-users by exhausting resources …
This attack makes the cloud services inaccessible to the end-users by exhausting resources …
A feature reduction based reflected and exploited DDoS attacks detection system
D Kshirsagar, S Kumar - Journal of Ambient Intelligence and Humanized …, 2022 - Springer
The hacker attempts distributed denial of service (DDoS) attacks towards network resources
to disturb or deny services. The hacker degrades the quality of service to legitimate users by …
to disturb or deny services. The hacker degrades the quality of service to legitimate users by …
Averaged dependence estimators for DoS attack detection in IoT networks
Wireless sensor networks (WSNs) have evolved to become an integral part of the
contemporary Internet of Things (IoT) paradigm. The sensor node activities of both sensing …
contemporary Internet of Things (IoT) paradigm. The sensor node activities of both sensing …
The hybrid technique for DDoS detection with supervised learning algorithms
S Hosseini, M Azizi - Computer Networks, 2019 - Elsevier
Distributed denial of service (DDoS) is still one of the main threats of the online services.
Attackers are able to run DDoS with simple steps and high efficiency in order to prevent or …
Attackers are able to run DDoS with simple steps and high efficiency in order to prevent or …
A systematic review on hybrid intrusion detection system
As computer networks keep growing at a high rate, achieving confidentiality, integrity, and
availability of the information system is essential. Intrusion detection systems (IDSs) have …
availability of the information system is essential. Intrusion detection systems (IDSs) have …
Self-organizing map-based approaches in DDoS flooding detection using SDN
TM Nam, PH Phong, TD Khoa… - 2018 International …, 2018 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attack is one of the most long-lasting problems in
network security. Recently, although the DDoS attack mechanisms are widely understood …
network security. Recently, although the DDoS attack mechanisms are widely understood …
Traffic anomaly detection in wireless sensor networks based on principal component analysis and deep convolution neural network
C Yao, Y Yang, K Yin, J Yang - IEEE Access, 2022 - ieeexplore.ieee.org
With the popularity of wireless networks, wireless sensor networks (WSNs) have advanced
rapidly, and their flexibility and ease of deployment have resulted in more security concerns …
rapidly, and their flexibility and ease of deployment have resulted in more security concerns …