Results 61 to 70 of about 20,777 (211)

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Construction of DDoS attacks malicious behavior knowledge base construction

open access: yesDianxin kexue, 2021
Aiming at the problem of insufficient research on the knowledge base of distributed denial of service (DDoS) network attacks, a method for constructing a knowledge base of DDoS attacks malicious behavior was proposed.The knowledge base was constructed ...
Feiyang LIU   +3 more
doaj   +2 more sources

HTTP/2 Tsunami: Investigating HTTP/2 Proxy Amplification DDoS Attacks [PDF]

open access: yes, 2017
Distributed Denial of Service (DDoS) attacks cause significant damage to computer systems by taking a system of-fline. Hypertext Transfer Protocol (HTTP), is the most commonly used protocol for web services.
Beckett, David, Sezer, Sakir
core   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Mitigation of Distributed Denial of Service Attacks in the Cloud

open access: yesCybernetics and Information Technologies, 2017
Cybersecurity attacks resulting in loss of availability of cloud services can have significantly higher impact than those in the traditional stand-alone enterprise setups.
Alosaimi Wael   +4 more
doaj   +1 more source

An Approach for Mitigating Denial of Service Attack [PDF]

open access: yes, 2013
Distributed Denial of Service (DDoS) attacks are the most common types of cyber-attack on the internet and are rapidly increasing. Denial of service/distributed denial of service attack is an explicit attempt to make a machine or a network resource ...
Chauhan, Chetan
core  

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, Volume 72, Issue 5, May 2026.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

open access: yesThe Scientific World Journal, 2015
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed ...
Mohammed A. Saleh, Azizah Abdul Manaf
doaj   +1 more source

DDosTC: A Transformer-Based Network Attack Detection Hybrid Mechanism in SDN

open access: yesSensors, 2021
Software-defined networking (SDN) has emerged in recent years as a form of Internet architecture. Its scalability, dynamics, and programmability simplify the traditional Internet structure.
Haomin Wang, Wei Li
doaj   +1 more source

DDoS Attacks with Randomized Traffic Innovation: Botnet Identification Challenges and Strategies

open access: yes, 2016
Distributed Denial-of-Service (DDoS) attacks are usually launched through the $botnet$, an "army" of compromised nodes hidden in the network. Inferential tools for DDoS mitigation should accordingly enable an early and reliable discrimination of the ...
Di Mauro, Mario   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy