4.6 Article

Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

An Intelligent ICMPv6 DDoS Flooding-Attack Detection Framework (v6IIDS) using Back-Propagation Neural Network

Redhwan M. A. Saad et al.

IETE TECHNICAL REVIEW (2016)

Article Computer Science, Hardware & Architecture

A distributed filtering mechanism against DDoS attacks: ScoreForCore

Kubra Kalkan et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Artificial Intelligence

Detection of known and unknown DDoS attacks using Artificial Neural Networks

Alan Saied et al.

NEUROCOMPUTING (2016)

Article Computer Science, Artificial Intelligence

GA-based learning for rule identification in fuzzy neural networks

Keshav Dahal et al.

APPLIED SOFT COMPUTING (2015)

Article Computer Science, Information Systems

Detecting DDoS attacks against data center with correlation analysis

Peng Xiao et al.

COMPUTER COMMUNICATIONS (2015)

Article Computer Science, Hardware & Architecture

DDoS attack protection in the era of cloud computing and Software-Defined Networking

Bing Wang et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Information Systems

Deceiving entropy based DoS detection

Ilker Oezcelik et al.

COMPUTERS & SECURITY (2015)

Proceedings Paper Computer Science, Theory & Methods

DDoS Attack Detection using Fast Entropy Approach on Flow-Based Network Traffic

Jisa David et al.

BIG DATA, CLOUD AND COMPUTING CHALLENGES (2015)

Article Computer Science, Information Systems

IEEE 802.11 DoS attack detection and mitigation utilizing Cross Layer Design

Joseph Soryal et al.

AD HOC NETWORKS (2014)

Article Computer Science, Information Systems

A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events

Sajal Bhatia et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Theory & Methods

DDoS defense system for web services in a cloud environment

Thomas Vissers et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2014)

Review Computer Science, Hardware & Architecture

Network attacks: Taxonomy, tools and systems

N. Hoque et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Hardware & Architecture

Dissecting SpyEye - Understanding the design of third generation botnets

Aditya K. Sood et al.

COMPUTER NETWORKS (2013)

Article Automation & Control Systems

Performance of HTTP Protocol in Networked Control Systems

Arkadiusz Jestratjew et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)

Article Computer Science, Artificial Intelligence

Computation of multilayer perceptron sensitivity to input perturbation

Jing Yang et al.

NEUROCOMPUTING (2013)

Article Automation & Control Systems

Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

Tongguang Ni et al.

JOURNAL OF CONTROL SCIENCE AND ENGINEERING (2013)

Article Computer Science, Information Systems

Real time DDoS detection using fuzzy estimators

Stavros N. Shiaeles et al.

COMPUTERS & SECURITY (2012)

Article Computer Science, Artificial Intelligence

Evolutionary RBF classifier for polarimetric SAR images

Turker Ince et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Interdisciplinary Applications

A new multistage approach to detect subtle DDoS attacks

Fei Wang et al.

MATHEMATICAL AND COMPUTER MODELLING (2012)

Proceedings Paper Computer Science, Hardware & Architecture

Tackling Application-layer DDoS Attacks

Hakem Beitollahi et al.

ANT 2012 AND MOBIWIS 2012 (2012)