Results 31 to 40 of about 61,931 (258)

Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method

open access: yesSymmetry, 2022
Cloud computing facilitates the users with on-demand services over the Internet. The services are accessible from anywhere at any time. Despite the valuable services, the paradigm is, also, prone to security issues. A Distributed Denial of Service (DDoS)
Mona A. Alduailij   +5 more
semanticscholar   +1 more source

HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

open access: yesApplied Computing and Informatics, 2019
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users.
Indraneel Sreeram   +1 more
doaj   +1 more source

An encryption-encoding architecture for security enhancement in 5G communication networks [PDF]

open access: yesITM Web of Conferences, 2023
This article introduces a hybrid architecture of cryptography and coding technique to provide security in 5G communication networks. There are various types of attacks in 5G communication systems.
Das Anwesha   +3 more
doaj   +1 more source

Protecting web services with service oriented traceback architecture [PDF]

open access: yes, 2008
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley   +2 more
core   +2 more sources

Deep learning approaches for detecting DDoS attacks: a systematic review

open access: yesSoft Computing - A Fusion of Foundations, Methodologies and Applications, 2022
In today’s world, technology has become an inevitable part of human life. In fact, during the Covid-19 pandemic, everything from the corporate world to educational institutes has shifted from offline to online.
Meenakshi Mittal   +2 more
semanticscholar   +1 more source

Combining Deep Learning Models for Enhancing the Detection of Botnet Attacks in Multiple Sensors Internet of Things Networks

open access: yesJOIV: International Journal on Informatics Visualization, 2021
Distributed-Denial-of-Service impacts are undeniably significant, and because of the development of IoT devices, they are expected to continue to rise in the future.
Abdulkareem A. Hezam   +4 more
doaj   +1 more source

Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer Perceptron

open access: yesFuture Internet, 2023
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands.
Sheeraz Ahmed   +7 more
semanticscholar   +1 more source

A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors

open access: yesApplied Sciences, 2019
In recent years, distributed denial of service (DDoS) attacks have increasingly shown the trend of multiattack vector composites, which has significantly improved the concealment and success rate of DDoS attacks.
Jian Zhang, Qidi Liang, Rui Jiang, Xi Li
doaj   +1 more source

SENATUS: An Approach to Joint Traffic Anomaly Detection and Root Cause Analysis [PDF]

open access: yes, 2017
In this paper, we propose a novel approach, called SENATUS, for joint traffic anomaly detection and root-cause analysis. Inspired from the concept of a senate, the key idea of the proposed approach is divided into three stages: election, voting and ...
Abdelkefi, Atef   +2 more
core   +2 more sources

Explainable AI-Based DDOS Attack Identification Method for IoT Networks

open access: yesDe Computis, 2023
The modern digitized world is mainly dependent on online services. The availability of online systems continues to be seriously challenged by distributed denial of service (DDoS) attacks.
Chathuranga Sampath Kalutharage   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy