Results 1 to 10 of about 291,448 (281)

Network Attack Detection Method of the Cyber-Physical Power System Based on Ensemble Learning

open access: yesApplied Sciences, 2022
With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS).
Jie Cao   +5 more
doaj   +3 more sources

Anomaly Detection Algorithm Based on SSC-BP Neural Network [PDF]

open access: yesJisuanji kexue, 2021
Aiming at the increasing number and complexity of new network attacks in the Internet of Things environment,the traditional anomaly detection algorithm has high false alarm rate,low detection rate and large amount of data,which cause calculation ...
SHI Lin-shan, MA Chuang, YANG Yun, JIN Min
doaj   +1 more source

LSTM-Based Collaborative Source-Side DDoS Attack Detection

open access: yesIEEE Access, 2022
As denial of service attacks become more sophisticated, the source-side detection techniques are being studied to solve the limitations of target-side detection techniques such as delayed detection and difficulty in tracking attackers.
Sungwoong Yeom   +2 more
doaj   +1 more source

DDoS Attack Detection Based on DBN in SDN Environment [PDF]

open access: yesJisuanji gongcheng, 2020
The main security threats to Software Defined Network(SDN),a new type of network architecture,are from DDoS attacks.Hence,theestablishment of an efficient DDoS attack detection system is importantt to network security management.In the SDN environment ...
ZHU Jing, WU Zhongdong, DING Longbin, WANG Yang
doaj   +1 more source

Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2008
The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture.
Grzegorz Kolaczek, Krzysztof Juszczyszyn
doaj   +1 more source

Detection and Defense Mechanism of LDoS Attack in SDN Environment

open access: yesJisuanji kexue yu tansuo, 2020
Low-rate denial of service (LDoS) attack is a new type of network attack, which is characterized by low attack cost and strong concealment. As a new type of network architecture, software defined network (SDN) is also threatened by LDoS attacks.
YAN Tong, BAI Zhihua, GAO Zhen, YAN Lina, ZHOU Lei
doaj   +1 more source

Wormhole attack detection techniques in ad-hoc network: A systematic review

open access: yesOpen Computer Science, 2022
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different
Gupta Chitvan   +2 more
doaj   +1 more source

Detection of DDoS Attacks in Software Defined Networking Using Entropy

open access: yesApplied Sciences, 2021
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent years. With the substantial increase in the number of Internet users, network security threats appear more frequently, which brings more concerns to SDN ...
Cong Fan   +5 more
doaj   +1 more source

LDoS attack detection method based on simple statistical features

open access: yesTongxin xuebao, 2022
Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the ...
Xueyuan DUAN, Yu FU, Kun WANG, Bin LI
doaj   +2 more sources

Multi-type low-rate DDoS attack detection method based on hybrid deep learning

open access: yes网络与信息安全学报, 2022
Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack ...
Lijuan LI   +3 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy