MN Jasim, MT Gaata - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Network attacks of the distributed denial of service (DDoS) form are used to disrupt server replies and services. It is popular because it is easy to set up and challenging to detect. We …
M Wang, Y Lu, J Qin - Computers & Security, 2020 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is a stubborn network security problem. Various machine learning-based methods have been proposed to detect such attacks …
S Mandala, AI Ramadhan, M Rosalinda… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Advances in technology and the rapid development of the internet have created more opportunities for hackers to obtain information and data, creating the need to protect more …
B Geluvaraj, SK BV, M Umesh… - … for Advancement in …, 2023 - ieeexplore.ieee.org
Being used to target a single system or website with overwhelming traffic. This can cause the system or website to become unavailable to legitimate users. DDoS attacks are often used to …
AA Najar, S Manohar Naik - International Journal of Information …, 2022 - Springer
Abstract Distributed Denial of Service (DDoS) attacks continue to be the most dangerous over the Internet. With the rapid advancement of information and communication technology …
N Bindra, M Sood - Automatic Control and Computer Sciences, 2019 - Springer
Recent trends have revealed that DDoS attacks contribute to the majority of overall network attacks. Networks face challenges in distinguishing between legitimate and malicious flows …
MO Jatmika, A Pratomo, W Gunawan… - AIP Conference …, 2024 - pubs.aip.org
A broad increase in data consumption in society and industry trigger network operators looking to upgrade their metro networks with higher bandwidth requirements. Service …
US Chanu, KJ Singh, YJ Chanu - Journal of Information Security and …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are a weapon of choice for hackers that are accountable for degradation in network performance, website downtime, and …
Machine learning (ML) is used for network intrusion detection because it is predictable after training with relevant data. ML provides a great way to detect new and unknown attacks …