Cheng et al., 2018 - Google Patents
Adaptive DDoS Attack Detection Method Based on Multiple‐Kernel LearningCheng et al., 2018
View PDF- Document ID
- 10003638137874994160
- Author
- Cheng J
- Zhang C
- Tang X
- Sheng V
- Dong Z
- Li J
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Distributed denial of service (DDoS) attacks has caused huge economic losses to society. They have become one of the main threats to Internet security. Most of the current detection methods based on a single feature and fixed model parameters cannot effectively detect …
- 238000001514 detection method 0 title abstract description 56
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sahoo et al. | An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics | |
Koroniotis et al. | Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset | |
Bowman et al. | Detecting lateral movement in enterprise computer networks with unsupervised graph {AI} | |
Resende et al. | A survey of random forest based methods for intrusion detection systems | |
Aldribi et al. | Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking | |
Alauthaman et al. | A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks | |
Cheng et al. | Adaptive DDoS Attack Detection Method Based on Multiple‐Kernel Learning | |
Kumar et al. | Machine learning-based early detection of IoT botnets using network-edge traffic | |
Özçelik et al. | Deceiving entropy based DoS detection | |
Al-Fawa'reh et al. | Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior | |
Catak et al. | Distributed denial of service attack detection using autoencoder and deep neural networks | |
Guerber et al. | Machine Learning and Software Defined Network to secure communications in a swarm of drones | |
Haque et al. | A comprehensive study of cyber security attacks, classification, and countermeasures in the internet of things | |
Narang et al. | Feature selection for detection of peer-to-peer botnet traffic | |
Zhang et al. | Federated learning for distributed IIoT intrusion detection using transfer approaches | |
Memos et al. | A secure network model against bot attacks in edge-enabled industrial Internet of Things | |
Huang et al. | A multi-point collaborative DDoS defense mechanism for IIoT environment | |
Abdullayeva | Distributed denial of service attack detection in E-government cloud via data clustering | |
Zaib et al. | Deep learning based cyber bullying early detection using distributed denial of service flow | |
Fei et al. | A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions | |
Hagar et al. | Big Data Analytic Using Machine Learning Algorithms For Intrusion Detection System: A Survey | |
Chen et al. | Using improved Hilbert–Huang transformation method to detect routing-layer reduce of quality attack in wireless sensor network | |
Li et al. | Blockchain empowered federated learning for distributed network security behaviour knowledge base in 6G | |
Lah et al. | Proposed framework for network lateral movement detection based on user risk scoring in siem | |
Srinivasan et al. | ENetRM: ElasticNet Regression Model based malicious cyber-attacks prediction in real-time server |