4.8 Article

AIMM: Artificial Intelligence Merged Methods for flood DDoS attacks detection

Related references

Note: Only part of the references are listed.
Review Computer Science, Information Systems

Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review

Sanjay Madan et al.

Summary: This paper reviews the techniques and tools used for analysis of Linux-based IoT malware, including detection, analysis, and classification. The paper discusses various methods for collecting threat data and provides a thorough study of static and dynamic analysis tools and techniques for Linux malware. The development of machine learning methods using discrete features for classification of malicious programs is also a significant focus of this paper. The paper concludes with a discussion of open issues and challenges that need to be addressed by the research community.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Computer Science, Hardware & Architecture

A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets

Bushra Alhijawi et al.

Summary: This article reviews and classifies the research efforts on Software-Defined Networking (SDN) and Denial of Service (DoS) attacks. It presents solutions to cope with DoS attacks on SDN and SDN-based solutions to tackle DoS attacks on networks, and provides a detailed comparison among these approaches.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Information Systems

Low-rate DDoS attacks detection method using data compression and behavior divergence measurement

Xinqian Liu et al.

Summary: This paper proposes a new low-rate DDoS attack detection method (LDDM) by designing a multidimensional sketch structure and novel measurement methods to effectively distinguish between regular traffic and attack traffic, with a lower false positive and false negative rate.

COMPUTERS & SECURITY (2021)

Article Telecommunications

Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller

Anupama Mishra et al.

Summary: The combination of SDNs and cloud computing is widely accepted but still faces security threats, with DDoS attacks being the most severe. Despite the lack of effective solutions, research has proposed a new defensive mechanism and mitigation technique to address this issue.

TELECOMMUNICATION SYSTEMS (2021)

Article Computer Science, Theory & Methods

A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense

Amrita Dahiya et al.

Summary: DDoS attacks are powerful cyber weapons that can cause significant damage to organizations. This paper proposes a Bayesian game theory-based solution to combat malicious users and maximize social welfare through pricing and incentive mechanisms.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2021)

Review Computer Science, Information Systems

Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks

Manish Snehi et al.

Summary: The widespread adoption of IoT, Software-defined Networks, and Cloud Computing has facilitated the development of Cyber-Physical Systems. Despite offering solutions to DDoS attacks, Software-defined Cyber-Physical Systems still face vulnerabilities and security risks. Integrating Fog Computing as an architectural layer can enhance the security of the system.

COMPUTER SCIENCE REVIEW (2021)

Article Computer Science, Information Systems

Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture

Nagarathna Ravi et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

R. Doriguzzi-Corin et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Multidisciplinary Sciences

Bogazici University distributed denial of service dataset

Derya Erhan et al.

DATA IN BRIEF (2020)

Article Computer Science, Information Systems

FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks

Yizhen Jia et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning

Jesus Arturo Perez-Diaz et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Performance evaluation of Botnet DDoS attack detection using machine learning

Tong Anh Tuan et al.

EVOLUTIONARY INTELLIGENCE (2020)

Article Computer Science, Information Systems

An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks

Kshira Sagar Sahoo et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Hybrid DDoS Detection Framework Using Matching Pursuit Algorithm

Derya Erhan et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network

Wu Zhijun et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks

Shahzeb Haider et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

CPSS LR-DDoS Detection and Defense in Edge Computing Utilizing DCNN Q-Learning

Zengguang Liu et al.

IEEE ACCESS (2020)