Active learning to detect DDoS attack using ranked features

RK Deka, DK Bhattacharyya, JK Kalita - Computer Communications, 2019 - Elsevier
Network traffic classification to detect DDoS attacks is challenging in the context of high-
speed networks. In this paper, we discuss the need for distributed feature selection in …

Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic

N Moustafa - 2017 - unsworks.unsw.edu.au
Abstract Despite a Network Anomaly Detection System (NADS) being capable of detecting
existing and zero-day attacks, it is still not universally implemented in industry and real …

Invited talk: Thermal energy harvesting with thermo life

I Stark - International Workshop on Wearable and Implantable …, 2006 - ieeexplore.ieee.org
The continuous miniaturization and reduction of power consumption in modern electronic
devices enables and demands the employment of alternative energy sources. Primary …

Intrusion detection system (IDS) for combating attacks against cognitive radio networks

ZM Fadlullah, H Nishiyama, N Kato, MM Fouda - IEEE network, 2013 - ieeexplore.ieee.org
While cognitive radio networks (CRNs) present a promising solution to solve the scarcity of
the radio spectrum, they are still susceptible to security threats. Until now, only a few …

Fingerprinting internet DNS amplification DDoS activities

C Fachkha, E Bou-Harb… - 2014 6th International …, 2014 - ieeexplore.ieee.org
This work proposes a novel approach to infer and characterize Internet-scale DNS
amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer …

Congestion detection technique for multipath routing and load balancing in WSN

AM Ahmed, R Paulus - Wireless Networks, 2017 - Springer
In WSN, nodes collect the information from the surrounding environment and transferring to
base station. Multiple data transmission in a WSN causes the nodes near the base station to …

CBSigIDS: towards collaborative blockchained signature-based intrusion detection

S Tug, W Meng, Y Wang - … on Internet of Things (iThings) and …, 2018 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) are one of the most important security mechanisms that
help identify various attacks. To enhance the detection performance of a single IDS …

[PDF][PDF] Content sniffing attack detection in client and server side: A survey

BS Thakur, S Chaudhary - International Journal of Advanced Computer …, 2013 - Citeseer
In today's environment we cannot think about internet. It has the interface of client and
server. After analysing several research studies, we conclude that the communication …

Lightweight mobile core networks for machine type communications

T Taleb, A Ksentini, A Kobbane - IEEE Access, 2014 - ieeexplore.ieee.org
Machine type communications (MTCs) enable the communications of machines (devices) to
machines over mobile networks. Besides simplifying our daily lives, the MTC business …

Inferring distributed reflection denial of service attacks from darknet

C Fachkha, E Bou-Harb, M Debbabi - Computer Communications, 2015 - Elsevier
This work proposes a novel approach to infer and characterize Internet-scale DNS
Distributed Reflection Denial of Service (DRDoS) attacks by leveraging the darknet space …