4.4 Article

Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Interdisciplinary Applications

Energy efficiency maximization algorithm for underwater Mobile sensor networks

Subbulakshmi Pasupathi et al.

Summary: This article discusses the current status of modern underwater wireless sensor networks and one of the main obstacles in them - lifetime limitation. It then proposes an AUV-assisted acoustic communication protocol to reduce energy consumption. The system enhances lifetime by reducing the number of hops during sensor transmissions and improves the lifetime-efficiency balance ratio through dynamic AUV paths and dynamic gateway assignments.

EARTH SCIENCE INFORMATICS (2021)

Article Computer Science, Information Systems

Clustering based semi-supervised machine learning for DDoS attack classification

Mohammad Misbahuddin et al.

Summary: This paper presents a semi-supervised machine learning approach utilizing clustering to distinguish malicious attacks from normal traffic in network data. By extracting features and applying supervised learning algorithms, the study achieved successful classification of attacks and normal traffic.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT

S. Vimal et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Artificial Intelligence

Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud

Mohamed El Ghazouani et al.

INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE (2020)

Article Computer Science, Artificial Intelligence

Blockverse: A Cloud Blockchain-based Platform for Tracking in Affiliate Systems

A. Baldominos et al.

INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE (2020)

Review Telecommunications

A comprehensive survey on network anomaly detection

Gilberto Fernandes et al.

TELECOMMUNICATION SYSTEMS (2019)

Review Computer Science, Hardware & Architecture

A holistic review of Network Anomaly Detection Systems: A comprehensive survey

Nour Moustafa et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks

Bhuvaneswari N. G. Amma et al.

NEUROCOMPUTING (2019)

Article Computer Science, Information Systems

Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning

Francisco Sales de Lima Filho et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Proceedings Paper Computer Science, Information Systems

Dynamic Network Anomaly Detection System by Using Deep Learning Techniques

Peng Lin et al.

CLOUD COMPUTING - CLOUD 2019 (2019)

Article Computer Science, Information Systems

Intrusion detection of distributed denial of service attack in cloud

S. Velliangiri et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Collaborative approach on mitigating spectrum sensing data hijack attack and dynamic spectrum allocation based on CASG modeling in wireless cognitive radio networks

S. Vimal et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Theory & Methods

A novel statistical technique for intrusion detection systems

Enamul Kabir et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Multidisciplinary

A statistical and distributed packet filter against DDoS attacks in Cloud environment

Vikash C. Pandey et al.

SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES (2018)

Article Computer Science, Interdisciplinary Applications

Deep Learning Method for Denial of Service Attack Detection Based on Restricted Boltzmann Machine

Yadigar Imamverdiyev et al.

BIG DATA (2018)

Article Computer Science, Information Systems

Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing

Jieren Cheng et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives

Yuan Cao et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

Chuanlong Yin et al.

IEEE ACCESS (2017)

Review Computer Science, Information Systems

A survey and taxonomy of DoS attacks in cloud computing

Mohammad Masdari et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Automation & Control Systems

Denial of service attacks - an updated perspective

Gulshan Kumar

SYSTEMS SCIENCE & CONTROL ENGINEERING (2016)

Article Computer Science, Hardware & Architecture

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Zhiyuan Tan et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Hardware & Architecture

Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures

Francesco Palmieri et al.

JOURNAL OF SUPERCOMPUTING (2015)

Article Computer Science, Hardware & Architecture

A survey of emerging threats in cybersecurity

Julian Jang-Jaccard et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2014)

Review Computer Science, Hardware & Architecture

Network attacks: Taxonomy, tools and systems

N. Hoque et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Artificial Intelligence

Real-time anomaly detection systems for Denial-of-Service attacks by weighted k-nearest-neighbor classifiers

Ming-Yang Su

EXPERT SYSTEMS WITH APPLICATIONS (2011)