Detection of DDOS attack using deep learning model in cloud storage application

A Agarwal, M Khari, R Singh - Wireless Personal Communications, 2022 - Springer
In recent years, distributed denial of service (DDoS) attacks pose a serious threat to network
security. How to detect and defend against DDoS attacks is currently a hot topic in both …

[PDF][PDF] DDoS attack intrusion detection system based on hybridization of CNN and LSTM

ASA Issa, Z Albayrak - Acta Polytechnica Hungarica, 2023 - researchgate.net
A distributed denial-of-service (DDoS) attack is one of the most pernicious threats to network
security. DDoS attacks are considered one of the most common attacks among all network …

Training of information technology personnel through simulations for protection against cyber attacks

F Basholli, B Mema, A Basholli - Engineering Applications, 2024 - publish.mersin.edu.tr
Nowadays, the development of information technology, robotics and artificial intelligence,
has brought radical changes in every aspect of people's lives and this has made our lives …

Detecting insider attacks in blockchain networks

O Ajayi, T Saadawi - 2021 International Symposium on …, 2021 - ieeexplore.ieee.org
Blockchain technology has recently gained high popularity in data security, primarily to
mitigate against data breach and manipulation. Since its inception in 2008, it has been …

Secured cyber-attack signatures distribution using blockchain technology

O Ajayi, M Cherian, T Saadawi - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The proliferation of cloud database has increased its vulnerability to cyberattacks. Despite
several proposed methods of securing databases, malicious intruders find ways to exploit …

Blockchain-based architecture for secured cyber-attack features exchange

O Ajayi, T Saadawi - 2020 7th IEEE International conference on …, 2020 - ieeexplore.ieee.org
Despite the increased accuracy of intrusion detection systems (IDS) in identifying
cyberattacks in computer networks and devices connected to the internet, distributed or …

Consortium blockchain-based architecture for cyber-attack signatures and features distribution

O Ajayi, O Igbe, T Saadawi - 2019 IEEE 10th Annual Ubiquitous …, 2019 - ieeexplore.ieee.org
One of the effective ways of detecting malicious traffic in computer networks is intrusion
detection systems (IDS). Though IDS identify malicious activities in a network, it might be …

An immune optimization based deterministic dendritic cell algorithm

W Zhou, Y Liang - Applied Intelligence, 2022 - Springer
Anomaly detection is an important issue, which has been deeply studied in different
research domains and application fields. The dendritic cell algorithm (DCA) is one of the …

P4Chain: A Multichain Approach for Real-Time Anomaly Traffic Detection in P4 Network

O Ajayi, T Akinyemi, T Saadawi - 2023 IEEE 14th Annual …, 2023 - ieeexplore.ieee.org
Programming Protocol-independent Packet Processors (P4) is an open-source domain-
specific language to aid the data plane devices in programming packet forwarding. It has a …

Secure resilient edge cloud designed network

T Saadawi, A Kawaguchi, MJ Lee… - IEICE Transactions on …, 2020 - search.ieice.org
Systems for Internet of Things (IoT) have generated new requirements in all aspects of their
development and deployment, including expanded Quality of Service (QoS) needs …