Distributed denial of service attack detection using naive bayes classifier through info gain feature selection
Distributed Denial of Service (DDoS) attack brings revenue loss, productivity loss, reputation
damage, theft, etc. to huge banking and business firms. This leads to the necessity of a good …
damage, theft, etc. to huge banking and business firms. This leads to the necessity of a good …
Denial of service attack in software defined network
P Bera, A Saha, SK Setua - 2016 5th International Conference …, 2016 - ieeexplore.ieee.org
Software Defined Network (SDN), a very new idea in networking domain, promises to
dramatically simplify network management and enable innovation through network …
dramatically simplify network management and enable innovation through network …
Identifying legitimate user in DDoS attack using Petri net
K Kavitha, T Babitha, V Praveena, P Devika - Materials Today: Proceedings, 2022 - Elsevier
The effective construction of systems and that are embedded in an automated or
organisational context is a major difficulty in modern research. These systems are built so …
organisational context is a major difficulty in modern research. These systems are built so …
Implementation of energy aware secure routing protocol over flooding environment in MANET
K Sawant, MK Rawat, A Jain - 2015 International Conference …, 2015 - ieeexplore.ieee.org
One of the most up-and-coming fields for research is mobile ad hoc network. Therefore
independent nods mobility is an essential property of network. In these networks the routing …
independent nods mobility is an essential property of network. In these networks the routing …
A Study on Recent Approaches in Managing and Detection of DDoS Attacks
AAP Raj, JKK Mozhi - International Journal of Computer Science & …, 2024 - koreascience.kr
In a system we use to share the data over the around the world. While sharing the data is to
keep up the information confidentially. Attacker in the system may capture this privately data …
keep up the information confidentially. Attacker in the system may capture this privately data …
[PDF][PDF] Counter and Network Density Based Detection and Prevention Scheme of DOS Attack in MANET
M Jha, R Singh, SS Dhakad - ijcsnt.info
This paper presents the denial of service attack in MANET using a threshold value. In our
approach, the node broadcasts the packets and then finds out the neighbors'. then it checks …
approach, the node broadcasts the packets and then finds out the neighbors'. then it checks …