4.6 Article

Detection of HTTP DDoS Attacks Using NFStream and TensorFlow

Related references

Note: Only part of the references are listed.
Review Computer Science, Artificial Intelligence

Deep learning approaches for detecting DDoS attacks: a systematic review

Meenakshi Mittal et al.

Summary: This paper provides a systematic review of the research on using deep learning techniques for detecting DDoS attacks. By analyzing and categorizing relevant literature, the paper summarizes different types of DDoS attack detection methods, the strengths and weaknesses of existing approaches, benchmark datasets and preprocessing strategies, as well as research gaps and future directions.

SOFT COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Methodology for Detecting Cyber Intrusions in e-Learning Systems during COVID-19 Pandemic

Ivan Cvitic et al.

Summary: This paper highlights the importance of the e-learning ecosystem in specific conditions and crises, such as the coronavirus pandemic, and discusses the negative impact of DDoS attacks on the Croatian e-learning system. It proposes a research methodology to develop a cyber-threat detection model that considers the specifics of e-learning systems in crisis, aiming to improve the quality of the teaching process and enhance the cyber-security of e-learning systems.

MOBILE NETWORKS & APPLICATIONS (2023)

Article Chemistry, Multidisciplinary

A Novel Approach for Efficient Mitigation against the SIP-Based DRDoS Attack

Ismail Melih Tas et al.

Summary: This study introduces a novel defense mechanism against advanced attacks that exploit vulnerabilities in less-known features of SIP. The defense mechanism consists of statistics, inspection, and action modules to mitigate the SIP-DRDoS attack. Experimental results show that the defense approach can analyze SIP traffic, detect and mitigate SIP flood attacks, significantly reducing CPU usage of the SIP server.

APPLIED SCIENCES-BASEL (2023)

Review Chemistry, Multidisciplinary

Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

Tariq Emad Ali et al.

Summary: Recent advancements in security approaches have greatly improved the ability to detect and mitigate threats in network infrastructure, such as SDN, and protect against various attacks. Machine learning and deep learning are popular techniques for preventing DDoS attacks on any network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks.

APPLIED SCIENCES-BASEL (2023)

Article Chemistry, Multidisciplinary

Distributed Blockchain-SDN Secure IoT System Based on ANN to Mitigate DDoS Attacks

Rihab Jmal et al.

Applied Sciences-Basel (2023)

Article Chemistry, Multidisciplinary

Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN

Tariq Emad Ali et al.

Summary: Software-defined networking (SDN) introduces new security and privacy risks, such as distributed denial-of-service (DDoS) attacks. Machine learning (ML) and deep learning (DL) have emerged as effective approaches to quickly identify and mitigate these threats. This research compares various classification methods and finds that support vector machines (SVMs) demonstrate the highest prediction accuracy for DDoS detection in SDN environments. The analysis provides valuable insights for developing efficient and accurate techniques to detect DDoS attacks with less complexity and time.

APPLIED SCIENCES-BASEL (2023)

Article Chemistry, Multidisciplinary

Malware API Calls Detection Using Hybrid Logistic Regression and RNN Model

Abdulaziz Almaleh et al.

Summary: This paper presents a novel hybrid model that utilizes both machine learning and deep learning algorithms to detect malware across various categories. The model recognizes the malicious functions performed by the malware based on API call sequences, improving the accuracy and efficiency of malware detection. The proposed model addresses the challenges associated with traditional weight initialization techniques in neural networks.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Hardware & Architecture

NFStream A flexible network data analysis framework

Zied Aouini et al.

Summary: This paper discusses the design and implementation of NFStream, a flexible network data analysis framework that provides real-time statistical analysis and reliable ground truth for modern network usage. This framework serves as a common research platform to stimulate research and develop more efficient and reproducible solutions in network traffic analytics.

COMPUTER NETWORKS (2022)

Article Computer Science, Information Systems

A hybrid method of entropy and SSAE-SVM based DDoS detection and mitigation mechanism in SDN

Zhang Long et al.

Summary: This research proposes a hybrid approach for detecting DDoS attacks in software-defined networking, using an initial detection module and a machine learning module. The proposed approach achieves superior detection performance, identifying over 98% of DDoS traffic with reduced training time and computational burden.

COMPUTERS & SECURITY (2022)

Article Chemistry, Multidisciplinary

A Secured Industrial Internet-of-Things Architecture Based on Blockchain Technology and Machine Learning for Sensor Access Control Systems in Smart Manufacturing

Hichem Mrabet et al.

Summary: This paper proposes a layered architecture incorporating blockchain technology and machine learning for smart manufacturing applications in the IIoT environment. Experimental results demonstrate that the proposed architecture can significantly reduce various attacks and threats.

APPLIED SCIENCES-BASEL (2022)

Review Chemistry, Multidisciplinary

Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy

Ziyad R. Alashhab et al.

Summary: This survey discusses the security issues and challenges in cloud computing, proposes a new taxonomy for classifying cloud computing attacks and DDoS attacks, and compares it with existing surveys. The survey aims to serve as a guide and reference for researchers working on new DDoS attack detection approaches within the cloud computing environment.

APPLIED SCIENCES-BASEL (2022)

Article Chemistry, Multidisciplinary

Machine Learning Based Signaling DDoS Detection System for 5G Stand Alone Core Network

Seongmin Park et al.

Summary: This research proposes a method, along with a threat detection system, to mitigate signaling DDoS attacks targeted on 5G CNs. It is verified that the use of fundamental ML classifiers together with preprocessing with entropy-based analysis and statistics-based analysis enables us to proactively react against signaling DDoS attacks. The evaluation results manifest that the random forest achieves the best detection performance, with an average accuracy of 98.7%.

APPLIED SCIENCES-BASEL (2022)

Article Chemistry, Multidisciplinary

HTTP Adaptive Streaming Framework with Online Reinforcement Learning

Jeongho Kang et al.

Summary: In this study, an adaptive streaming scheme using online reinforcement learning is proposed to improve the quality of video streaming. The scheme adapts to changes in client environment by upgrading the ABR model and utilizes state-of-the-art reinforcement learning algorithm to train the neural network model during video streaming.

APPLIED SCIENCES-BASEL (2022)

Proceedings Paper Computer Science, Artificial Intelligence

LSTM-NB: DoS Attack Detection On SDN With P4 Programmable Dataplane

Sya Raihan Heggi et al.

Summary: This paper proposes LSTM-NB, a combination of LSTM and NB algorithms, to tackle DoS attacks on P4 language-based SDN. Through extensive experimental evaluation, it is concluded that the proposed approach exhibits a strong potential for DoS detection in the SDN environments.

2022 INTERNATIONAL CONFERENCE ON ADVANCED CREATIVE NETWORKS AND INTELLIGENT SYSTEMS, ICACNIS (2022)

Proceedings Paper Computer Science, Interdisciplinary Applications

Evaluation Framework for Netflow-based Network Anomaly Detection Systems using Synthetic Malicious Network Traffic

Shuvo Bardhan et al.

Summary: This paper presents a procedure for evaluating netflow-based network anomaly detection (NF-NAD) systems based on accuracy of detection and mean detection time. Unlike traditional methods, the paper introduces a new experimental approach where the benign traffic remains constant throughout the experiment to better evaluate the system. The paper also introduces a method of evaluating the system's learning capability by creating variations of synthetic malicious network traffic.

2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022) (2022)

Article Computer Science, Information Systems

Knowledge Discovery: Can It Shed New Light on Threshold Definition for Heavy-Hitter Detection?

Adrian Pekar et al.

Summary: In the field of networking, there is no universally accepted methodology for selecting thresholds for Heavy-Hitter (HH) flows, leading to varying effectiveness across different networks. Justified and valid thresholds require a detailed analysis of the network and its traffic, as well as the recognition that thresholds are application-dependent. It is also important to classify TCP and UDP flows with different thresholds due to the distinct characteristics exhibited by HHs in these protocols.

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT (2021)

Review Chemistry, Multidisciplinary

Firewall Best Practices for Securing Smart Healthcare Environment: A Review

Raja Waseem Anwar et al.

Summary: Smart healthcare environments are rapidly growing, providing services and benefits to healthcare practitioners and patients, but also facing security risks and threats. Firewalls are crucial as the first line of defense for securing smart healthcare networks, yet selecting and implementing the right firewall remains a challenging task.

APPLIED SCIENCES-BASEL (2021)

Article Chemistry, Multidisciplinary

Generating Network Intrusion Detection Dataset Based on Real and Encrypted Synthetic Attack Traffic

Andrey Ferriyan et al.

Summary: This paper presents the HIKARI-2021 dataset, which contains encrypted synthetic attacks and benign traffic to address the lack of up-to-date datasets for evaluating intrusion detection systems. The dataset meets content and process requirements, and is made available to enable future dataset developments.

APPLIED SCIENCES-BASEL (2021)

Review Chemistry, Multidisciplinary

Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research

Majda Wazzan et al.

Summary: The Internet of Things (IoT) technology offers great benefits, but also poses cybersecurity risks, particularly in terms of IoT botnets. This study conducted a systematic literature review to comprehensively evaluate and classify IoT botnet detection methods, providing a foundation for future research directions.

APPLIED SCIENCES-BASEL (2021)

Article Chemistry, Multidisciplinary

Detection of Unknown DDoS Attacks with Deep Learning and Gaussian Mixture Model

Chin-Shiuh Shieh et al.

Summary: The study investigates the impact of the Open Set Recognition (OSR) problem on the detection of DDoS attacks in ML/DL systems, proposing a new detection framework that achieves high recall, precision, and accuracy.

APPLIED SCIENCES-BASEL (2021)

Article Chemistry, Multidisciplinary

A Payload Based Malicious HTTP Traffic Detection Method Using Transfer Semi-Supervised Learning

Tieming Chen et al.

Summary: DeepPTSD is a deep learning method for payload-based malicious HTTP traffic detection, utilizing semi-supervised learning algorithm to enhance the target dataset, showing competitive performance under small data conditions.

APPLIED SCIENCES-BASEL (2021)

Proceedings Paper Computer Science, Information Systems

Detection of Unknown DDoS Attacks with Deep Learning and Gaussian Mixture Model

Thanh-Tuan Nguyen et al.

Summary: The development of the Internet has led to security issues, but deep learning has been applied to attack detection. Most methods currently suffer from open-set recognition issues, while this paper uses time series-based BILSTM and a Gaussian mixture model to handle unknown attacks, with experimental results showing a detection rate close to 99%.

2021 4TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2021) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Is Machine Learning Ready for Traffic Engineering Optimization?

Guillermo Bernardez et al.

Summary: This research analyzes whether modern machine learning methods are suitable for traffic engineering optimization, and implements a distributed system based on multi-agent reinforcement learning and graph neural networks. Experimental results show that the proposed solution achieves comparable performance to constraint programming technology in various network scenarios while significantly reducing execution time.

2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021) (2021)

Article Business

Machine learning and deep learning

Christian Janiesch et al.

Summary: This article introduces the basic concepts of machine learning and deep learning in intelligent systems, as well as their advantages and challenges in practical applications, emphasizing the importance of human-machine interaction and artificial intelligence servitization.

ELECTRONIC MARKETS (2021)

Article Computer Science, Information Systems

Analysis of the constrained application protocol over quick UDP internet connection transport

Rolando Herrero

INTERNET OF THINGS (2020)

Proceedings Paper Computer Science, Theory & Methods

An Intrusion Detection System Against DDoS Attacks in IoT Networks

Monika Roopak et al.

2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) (2020)

Article Computer Science, Theory & Methods

Self-supervised network traffic management for DDoS mitigation within the ISP domain

Ili Ko et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Review Computer Science, Hardware & Architecture

A holistic review of Network Anomaly Detection Systems: A comprehensive survey

Nour Moustafa et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Review Computer Science, Artificial Intelligence

Machine learning in cybersecurity: A review

Anand Handa et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2019)

Article Computer Science, Information Systems

DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation

Muhammad Aamir et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2019)

Article Environmental Sciences

A novel optimal-hybrid model for daily air quality index prediction considering air pollutant factors

Qunli Wu et al.

SCIENCE OF THE TOTAL ENVIRONMENT (2019)

Article Chemistry, Multidisciplinary

An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers

Riaz Ullah Khan et al.

APPLIED SCIENCES-BASEL (2019)

Article Computer Science, Information Systems

A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks

Sahil Garg et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Article Chemistry, Multidisciplinary

A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors

Jian Zhang et al.

APPLIED SCIENCES-BASEL (2019)

Proceedings Paper Computer Science, Information Systems

Developing a Network Attack Detection System Using Deep Learning

Bayan Alsughayyir et al.

2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Heavy-Hitter Flow Identification in Data Centre Networks Using Packet Size Distribution and Template Matching

Alejandra Duque-Torres et al.

PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019) (2019)

Article Computer Science, Artificial Intelligence

DESIGN AND IMPLEMENTATION OF AN ARTIFICIAL INTELLIGENCE-BASED WEB APPLICATION FIREWALL MODEL

A. Tekerek et al.

NEURAL NETWORK WORLD (2019)

Proceedings Paper Computer Science, Information Systems

LSTM-BA: DDoS Detection Approach Combining LSTM and Bayes

Yan Li et al.

2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD) (2019)

Article Computer Science, Software Engineering

THE SLOW HTTP DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION IN CLOUD

A. Dhanapal et al.

SCALABLE COMPUTING-PRACTICE AND EXPERIENCE (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Detecting cryptocurrency miners with NetFlow/IPFIX network measurements

Jordi Zayuelas i Munoz et al.

2019 IEEE INTERNATIONAL SYMPOSIUM ON MEASUREMENTS & NETWORKING (M&N 2019) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models

Ahmed Ahmim et al.

2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS) (2019)

Article Automation & Control Systems

Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset

Naveen Bindra et al.

AUTOMATIC CONTROL AND COMPUTER SCIENCES (2019)

Article Computer Science, Hardware & Architecture

A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection

Vajiheh Hajisalem et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

Enhanced Network Anomaly Detection Based on Deep Neural Networks

Sheraz Naseer et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection

Andy Brown et al.

PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING FOR COMPUTING SYSTEMS (MLCS 2018) (2018)

Article Computer Science, Theory & Methods

Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers

Hongbin Luo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Review Automation & Control Systems

A review of detection approaches for distributed denial of service attacks

Parneet Kaur et al.

SYSTEMS SCIENCE & CONTROL ENGINEERING (2017)

Proceedings Paper Computer Science, Information Systems

User Behavior Anomaly Detection for Application Layer DDoS Attacks

Maryam M. Najafabadi et al.

2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

DeepDefense: Identifying DDoS Attack via Deep Learning

Xiaoyong Yuan et al.

2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP) (2017)

Proceedings Paper Computer Science, Theory & Methods

Trends in Validation of DDoS Research

Sunny Behal et al.

INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016) (2016)

Article Multidisciplinary Sciences

A Novel Intrusion Detection System Based on Trust Evaluation to Defend Against DDoS Attack in MANET

M. Poongodi et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2015)

Article Computer Science, Information Systems

Botnet in DDoS Attacks: Trends and Challenges

Nazrul Hoque et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Engineering, Electrical & Electronic

Software Defined Network Traffic Measurement: Current Trends and Challenges

Abdulsalam Yassine et al.

IEEE INSTRUMENTATION & MEASUREMENT MAGAZINE (2015)

Proceedings Paper Computer Science, Hardware & Architecture

CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud

Saeed Shafieian et al.

CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING (2015)

Proceedings Paper Computer Science, Information Systems

SDN Based QoE Optimization for HTTP-Based Adaptive Video Streaming

Sangeeta Ramakrishnan et al.

2015 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM) (2015)

Article Computer Science, Artificial Intelligence

A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment

Junho Choi et al.

SOFT COMPUTING (2014)

Article Computer Science, Information Systems

Distributed denial of service attack detection using an ensemble of neural classifier

P. Arun Raj Kumar et al.

COMPUTER COMMUNICATIONS (2011)

Review Computer Science, Information Systems

Data preprocessing for anomaly based network intrusion detection: A review

Jonathan J. Davis et al.

COMPUTERS & SECURITY (2011)

Article Engineering, Electrical & Electronic

Using Whitelisting to Mitigate DDoS Attacks on Critical Internet Sites

MyungKeun Yoon

IEEE COMMUNICATIONS MAGAZINE (2010)