Nothing Special   »   [go: up one dir, main page]

Cheng et al., 2018 - Google Patents

Adaptive DDoS Attack Detection Method Based on Multiple‐Kernel Learning

Cheng et al., 2018

View PDF @Full View
Document ID
10003638137874994160
Author
Cheng J
Zhang C
Tang X
Sheng V
Dong Z
Li J
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Distributed denial of service (DDoS) attacks has caused huge economic losses to society. They have become one of the main threats to Internet security. Most of the current detection methods based on a single feature and fixed model parameters cannot effectively detect …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Sahoo et al. An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics
Koroniotis et al. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset
Bowman et al. Detecting lateral movement in enterprise computer networks with unsupervised graph {AI}
Resende et al. A survey of random forest based methods for intrusion detection systems
Aldribi et al. Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking
Alauthaman et al. A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks
Cheng et al. Adaptive DDoS Attack Detection Method Based on Multiple‐Kernel Learning
Kumar et al. Machine learning-based early detection of IoT botnets using network-edge traffic
Özçelik et al. Deceiving entropy based DoS detection
Al-Fawa'reh et al. Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior
Catak et al. Distributed denial of service attack detection using autoencoder and deep neural networks
Guerber et al. Machine Learning and Software Defined Network to secure communications in a swarm of drones
Haque et al. A comprehensive study of cyber security attacks, classification, and countermeasures in the internet of things
Narang et al. Feature selection for detection of peer-to-peer botnet traffic
Zhang et al. Federated learning for distributed IIoT intrusion detection using transfer approaches
Memos et al. A secure network model against bot attacks in edge-enabled industrial Internet of Things
Huang et al. A multi-point collaborative DDoS defense mechanism for IIoT environment
Abdullayeva Distributed denial of service attack detection in E-government cloud via data clustering
Zaib et al. Deep learning based cyber bullying early detection using distributed denial of service flow
Fei et al. A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions
Hagar et al. Big Data Analytic Using Machine Learning Algorithms For Intrusion Detection System: A Survey
Chen et al. Using improved Hilbert–Huang transformation method to detect routing-layer reduce of quality attack in wireless sensor network
Li et al. Blockchain empowered federated learning for distributed network security behaviour knowledge base in 6G
Lah et al. Proposed framework for network lateral movement detection based on user risk scoring in siem
Srinivasan et al. ENetRM: ElasticNet Regression Model based malicious cyber-attacks prediction in real-time server