Results 61 to 70 of about 20,777 (211)
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Construction of DDoS attacks malicious behavior knowledge base construction
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU +3 more
doaj +2 more sources
HTTP/2 Tsunami: Investigating HTTP/2 Proxy Amplification DDoS Attacks [PDF]
Distributed Denial of Service (DDoS) attacks cause significant damage to computer systems by taking a system of-fline. Hypertext Transfer Protocol (HTTP), is the most commonly used protocol for web services.
Beckett, David, Sezer, Sakir
core +1 more source
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
Mitigation of Distributed Denial of Service Attacks in the Cloud
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups.
Alosaimi Wael +4 more
doaj +1 more source
An Approach for Mitigating Denial of Service Attack [PDF]
Distributed Denial of Service (DDoS) attacks are the most common types of cyber-attack on the internet and are rapidly increasing. Denial of service/distributed denial of service attack is an explicit attempt to make a machine or a network resource ...
Chauhan, Chetan
core
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed ...
Mohammed A. Saleh, Azizah Abdul Manaf
doaj +1 more source
DDosTC: A Transformer-Based Network Attack Detection Hybrid Mechanism in SDN
Software-defined networking (SDN) has emerged in recent years as a form of Internet architecture. Its scalability, dynamics, and programmability simplify the traditional Internet structure.
Haomin Wang, Wei Li
doaj +1 more source
DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies
Distributed Denial-of-Service (DDoS) attacks are usually launched through the $botnet$, an "army" of compromised nodes hidden in the network. Inferential tools for DDoS mitigation should accordingly enable an early and reliable discrimination of the ...
Di Mauro, Mario +2 more
core +1 more source

