Security data collection and data analytics in the internet: A survey
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …
detect security threats and measure the security of the Internet arises a significant research …
Adaptive feature selection for denial of services (DoS) attack
Adaptive detection is the learning ability to detect any changes in patterns in intrusion
detection systems. In this paper, we propose combining two techniques in feature selection …
detection systems. In this paper, we propose combining two techniques in feature selection …
Light weighted CNN model to detect DDoS attack over distributed scenario
The minimal‐degree distributed denial‐of‐service attack takes advantage of flaws in the
adaptive mechanisms of network protocols, which could have a big impact on network …
adaptive mechanisms of network protocols, which could have a big impact on network …
Detection techniques of DDoS attacks: A survey
Security is the main confront of internet, Distributed Denial of Service (DDoS) is the major
cause of threat. DDoS reduces the network resources, and results in bandwidth depletion …
cause of threat. DDoS reduces the network resources, and results in bandwidth depletion …
[PDF][PDF] Network attacks and their detection mechanisms: A review
NS Mangrulkar, ARB Patil, AS Pande - International Journal of Computer …, 2014 - Citeseer
With the development of large open networks, security threats for the network have
increased significantly in the past few years. Different types of attacks possess different types …
increased significantly in the past few years. Different types of attacks possess different types …
[HTML][HTML] Evaluation of Boruta algorithm in DDoS detection
N Farhana, A Firdaus, MF Darmawan… - Egyptian Informatics …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) is a type of attack that leverages many
compromised systems or computers, as well as multiple Internet connections, to flood …
compromised systems or computers, as well as multiple Internet connections, to flood …
Triple modular redundancy optimization for threshold determination in intrusion detection systems
I Babić, A Miljković, M Čabarkapa, V Nikolić… - Symmetry, 2021 - mdpi.com
This paper presents a novel approach for an Intrusion Detection System (IDS) based on one
kind of asymmetric optimization which use any three already well-known IDS algorithms and …
kind of asymmetric optimization which use any three already well-known IDS algorithms and …
Distributed denial of service attack detection using naive bayes classifier through info gain feature selection
Distributed Denial of Service (DDoS) attack brings revenue loss, productivity loss, reputation
damage, theft, etc. to huge banking and business firms. This leads to the necessity of a good …
damage, theft, etc. to huge banking and business firms. This leads to the necessity of a good …
Detection of DDoS Attacks using Fine-Tuned Multi-Layer Perceptron Models
This study addresses a major cybersecurity challenge by focusing on the detection of
Distributed Denial of Service (DDoS) attacks. These attacks pose a major threat to online …
Distributed Denial of Service (DDoS) attacks. These attacks pose a major threat to online …
Ant‐based distributed denial of service detection technique using roaming virtual honeypots
R Selvaraj, V Madhav Kuthadi… - IET Communications, 2016 - Wiley Online Library
Nowadays, distributed denial of service (DDoS) becomes a major challenge in the network
as it affects the network at multi‐level. This leads to traffic overhead and wastage of …
as it affects the network at multi‐level. This leads to traffic overhead and wastage of …