4.2 Article

An Efficient DDoS Attack Detection Using Chaos Henry Gas Solubility Optimization Weight Initialization Based Rectified Linear Unit

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Interdisciplinary Applications

A novel chaotic Henry gas solubility optimization algorithm for solving real-world engineering problems

Betul Sultan Yildiz et al.

Summary: The paper introduces a novel metaheuristic algorithm named chaotic Henry gas solubility optimization (CHGSO), which integrates chaotic maps into the optimization process to enhance convergence rate. The performance of CHGSO was evaluated on various constrained optimization problems in mechanical design and manufacturing, showing robust optimization capability.

ENGINEERING WITH COMPUTERS (2022)

Article Computer Science, Hardware & Architecture

Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques

Alaeddine Mihoub et al.

Summary: This paper investigates the detection of DoS/DDoS attacks in IoT using machine learning techniques. A new architecture is proposed, consisting of two components: DoS/DDoS detection and mitigation. The detection component provides fine-granularity detection, identifying the specific type of attack and packet type used. Evaluation on the Bot-IoT dataset shows promising results, with a Looking-Back-enabled Random Forest classifier achieving an accuracy of 99.81%.

COMPUTERS & ELECTRICAL ENGINEERING (2022)

Article Computer Science, Hardware & Architecture

DOCUS-DDoS detection in SDN using modified CUSUM with flash traffic discrimination and mitigation

P. V. Shalini et al.

Summary: SDN separates the data plane from the control plane, enabling centralized control and faster data transmission. However, it faces challenges in network security, especially in the detection of DDoS attacks.

COMPUTER NETWORKS (2022)

Article Computer Science, Software Engineering

Weight initialization based-rectified linear unit activation function to improve the performance of a convolutional neural network model

Bekhzod Olimov et al.

Summary: This paper explores different weight initialization strategies and proposes a weight initialization-based ReLU activation function, which performs better on Fashion-MNIST and CIFAR-10 databases.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2021)

Article Computer Science, Artificial Intelligence

Event-Triggered Switching-Type Fault Detection and Isolation for Fuzzy Control Systems Under DoS Attacks

Xiang-Gui Guo et al.

Summary: This article investigates an adaptive event-triggered fault detection and isolation scheme for nonlinear networked control systems under DoS attacks, utilizing a novel triggering mechanism and a switching state-feedback controller. The proposed approach demonstrates effectiveness in simulation cases and offers advantages in saving communication resources.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2021)

Article Computer Science, Information Systems

The detection of low-rate DoS attacks using the SADBSCAN algorithm

Dan Tang et al.

Summary: The new low-rate DoS attack detection scheme utilizes the SADBSCAN algorithm to cluster network traffic based on characteristics and determine the presence of attacks using cosine similarity. Experimental results show improved detection accuracy, reduced false negative rate, and adaptability to large-scale complex network environments.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks

Minzhao Lyu et al.

Summary: DNS is a critical service for enterprise operations but is often targeted by malicious actors. Current solutions are not robust against attackers who change their identity or rates to evade detection. This paper proposes a method combining hierarchical graph structure and machine learning to detect distributed DNS attacks at different levels, even with low rates and stealthy patterns.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Computer Science, Hardware & Architecture

Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions

Ismael Amezcua Valdovinos et al.

Summary: SDN is a network paradigm that separates control and data planes, with the controller controlling the network logic and switches following rules to distribute traffic. The article systematically explores existing DDoS detection and mitigation strategies in SDN.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

Neural-network-based adaptive secure control for nonstrict-feedback nonlinear interconnected systems under DoS attacks

Xinfeng Shao et al.

Summary: This paper investigates the problems of decentralized adaptive neural network secure control for a class of nonstrict-feedback nonlinear interconnected large-scale systems under denial-of-service attacks. A novel dynamic gain observer is constructed to solve the difficulty of sampling in the presence of DoS attacks. The stability is proven based on Lyapunov stability theory and the improved average dwell time method.

NEUROCOMPUTING (2021)

Proceedings Paper Computer Science, Information Systems

Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization

Odnan Ref Sanchez et al.

Summary: DDoS attacks disrupt global network services by overwhelming victim hosts with requests, and are currently on the rise. Traditional Machine Learning methods used for developing DDoS detectors show satisfactory results, with Random Forests achieving a detection accuracy as high as 99%.

PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE (2021)

Article Computer Science, Information Systems

Detection and Classification of DDoS Flooding Attacks on Software-Defined Networks: A Case Study for the Application of Machine Learning

Abimbola O. Sangodoyin et al.

Summary: Software-defined networks (SDNs) provide robust network architectures for Internet of Things (IoT) applications but are also attractive targets for cyber attackers. Vulnerable to Distributed Denial of Service (DDoS) flooding attacks, machine learning algorithms such as Quadratic Discriminant Analysis (QDA), Gaussian Naive Bayes (GNB), k-nearest neighbor (k-NN), and Classification and Regression Tree (CART) are investigated for detecting and classifying these attacks on SDNs, with CART showing the best overall performance.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

An Efficient IDS Framework for DDoS Attacks in SDN Environment

Josy Elsa Varghese et al.

Summary: The rapid expansion of the Internet has led to increased network traffic and security challenges, particularly in dealing with Distributed Denial-of-Service (DDoS) attacks. A novel DDoS detection framework based on DPDK is proposed in this study, which incorporates intelligence at the data layer to efficiently detect and combat DDoS attacks.

IEEE ACCESS (2021)

Article Business

DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids

Mohamed Amine Ferrag et al.

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT (2020)

Article Computer Science, Theory & Methods

Reliable Detection of Interest Flooding Attack in Real Deployment of Named Data Networking

Tan Nguyen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Hardware & Architecture

On the performance of intelligent techniques for intensive and stealthy DDos detection

Xiaoyu Liang et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

Efficient Distributed Denial-of-Service Attack Defense in SDN-Based Cloud

Trung Phan et al.

IEEE ACCESS (2019)

Article Telecommunications

A Novel DoS and DDoS Attacks Detection Algorithm Using ARIMA Time Series Model and Chaotic System in Computer Networks

Seyyed Meysam Tabatabaie Nezhad et al.

IEEE COMMUNICATIONS LETTERS (2016)

Article Computer Science, Information Systems

Anomaly-based network intrusion detection: Techniques, systems and challenges

P. Garcia-Teodoro et al.

COMPUTERS & SECURITY (2009)

Article Computer Science, Hardware & Architecture

Denial of service in sensor networks

AD Wood et al.

COMPUTER (2002)