[PDF][PDF] A design and simulation of adaptive intrusion detection system based on data mining

X Su, T Shi - Computer Science and Application, 2018 - pdf.hanspub.org
… This approach is based on division method in graph theory. Besides, … using the isolated
forest detection method, this method can find data that does not conform well with other data

網路安全監控行為之實作與分析

劉明輝, 蔡文賢 - 2007 - ir.lib.nycu.edu.tw
DDoS attacks and the current methods for defense. In Chapter 2, we will introduce the
internet-based intrusion detection system … an important record from the huge data and reduce the …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
Dos attack is one of the common attack used in loT … security in Mobile IoT using Big data
processing and ML. [64] … Intrusion Detection System (IDS) using a supervised learning method of …

[PDF][PDF] Addressing Security and Computation TS Challenges in IoT Using Machine 醫官Learning

BK Mohanta, U Satapathy, D Jena - researchgate.net
… The real-time monitoring security of the system, even it is … implementation platform available
and the solution approach for a … earthquake detection and even smart fire detection systems

车联网环境下的DDoS 攻击实时检测技术研究.

于露, 李嘉彬, 薛质 - Journal of Railway Science & …, 2022 - search.ebscohost.com
… distributed denial-of-service attack real-time detection system was designed. The information
entropy theory was used … Statistical approaches to DDoS attack detection and response[C]// …

一种基于改进ReliefF 算法的入侵检测模型

刘财辉, 周琪, 叶晓文 - 山东大学学报(工学版), 2023 - gxbwk.njournal.sdu.edu.cn
… Survey on SDN based network intrusion detection system using machine learning approaches[J].
… Intrusion detection system based on decision tree over big data in fog environment[J]. …

以決策樹偵測殭屍網路之研究

鄧氏, 金銀 - 2014 - irlib.pccu.edu.tw
… Chapter 3 Modeling of Detection System: This chapter presents … for the development of
methods to prevent DDOS attacks. … to explore normality and abnormality in large data sets. In fact, …

偵測網際網路攻擊之基於熵的網路行為模式建立演算法

何俊德, 李程輝 - 2008 - ir.lib.nycu.edu.tw
… [2] proposed an optimized intrusion detection system using … to validate the proposed approach
for detecting DoS attack. … In our study, we focus on the denial-of-service attack (DoS attack

SDN 中基于机器学习的DDoS 攻击协同防御

尚立, 陈明, 张磊, 刘辛彤, 石泰, 李保罡 - 电力系统保护与控制, 2021 - dlkz.net
… Cooperative defense of DDoS attack based on machine … and normal traffic, and comparing
with other detection methods. … can also be uploaded to the monitoring system in real time to …

基于大数据分析的APT 攻击检测研究综述

付钰, 李洪成, 吴晓平, 王甲生 - 通信学报, 2015 - infocomm-journal.com
… A hybrid approach to counter application layer DDoS attacks[… Detecting app-DDoS attacks
based on maximal frequent … behavior detection system of android application based on multi-…