Security data collection and data analytics in the internet: A survey

X Jing, Z Yan, W Pedrycz - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Attacks over the Internet are becoming more and more complex and sophisticated. How to
detect security threats and measure the security of the Internet arises a significant research …

Adaptive feature selection for denial of services (DoS) attack

AR Yusof, NI Udzir, A Selamat… - … IEEE conference on …, 2017 - ieeexplore.ieee.org
Adaptive detection is the learning ability to detect any changes in patterns in intrusion
detection systems. In this paper, we propose combining two techniques in feature selection …

Light weighted CNN model to detect DDoS attack over distributed scenario

H Kumar, Y Aoudni, GGR Ortiz, L Jindal… - Security and …, 2022 - Wiley Online Library
The minimal‐degree distributed denial‐of‐service attack takes advantage of flaws in the
adaptive mechanisms of network protocols, which could have a big impact on network …

Detection techniques of DDoS attacks: A survey

P Kamboj, MC Trivedi, VK Yadav… - 2017 4th IEEE Uttar …, 2017 - ieeexplore.ieee.org
Security is the main confront of internet, Distributed Denial of Service (DDoS) is the major
cause of threat. DDoS reduces the network resources, and results in bandwidth depletion …

[PDF][PDF] Network attacks and their detection mechanisms: A review

NS Mangrulkar, ARB Patil, AS Pande - International Journal of Computer …, 2014 - Citeseer
With the development of large open networks, security threats for the network have
increased significantly in the past few years. Different types of attacks possess different types …

[HTML][HTML] Evaluation of Boruta algorithm in DDoS detection

N Farhana, A Firdaus, MF Darmawan… - Egyptian Informatics …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) is a type of attack that leverages many
compromised systems or computers, as well as multiple Internet connections, to flood …

Triple modular redundancy optimization for threshold determination in intrusion detection systems

I Babić, A Miljković, M Čabarkapa, V Nikolić… - Symmetry, 2021 - mdpi.com
This paper presents a novel approach for an Intrusion Detection System (IDS) based on one
kind of asymmetric optimization which use any three already well-known IDS algorithms and …

Distributed denial of service attack detection using naive bayes classifier through info gain feature selection

NA Singh, KJ Singh, T De - … of the international conference on informatics …, 2016 - dl.acm.org
Distributed Denial of Service (DDoS) attack brings revenue loss, productivity loss, reputation
damage, theft, etc. to huge banking and business firms. This leads to the necessity of a good …

Detection of DDoS Attacks using Fine-Tuned Multi-Layer Perceptron Models

A Sanmorino, L Marnisah, H Di Kesuma - Engineering, Technology & …, 2024 - etasr.com
This study addresses a major cybersecurity challenge by focusing on the detection of
Distributed Denial of Service (DDoS) attacks. These attacks pose a major threat to online …

Ant‐based distributed denial of service detection technique using roaming virtual honeypots

R Selvaraj, V Madhav Kuthadi… - IET Communications, 2016 - Wiley Online Library
Nowadays, distributed denial of service (DDoS) becomes a major challenge in the network
as it affects the network at multi‐level. This leads to traffic overhead and wastage of …