An adaptive method and a new dataset, UKM-IDS20, for the network intrusion detection system

MS Al-Daweri, S Abdullah, KAZ Ariffin - Computer Communications, 2021 - Elsevier
In recent years, the demand for computer networks has grown rapidly, thus allowing for
higher risk of novel attack incidents. Traditional network intrusion detection systems (IDSs) …

Poor coding leads to dos attack and security issues in web applications for sensors

KB Jalbani, M Yousaf, MS Sarfraz… - Security and …, 2021 - Wiley Online Library
As the SQL injection attack is still at the top of the list at Open Web Application Security
Project (OWASP) for more than one decade, this type of attack created too many types of …

Classifying denial of service attacks using fast machine learning algorithms

Z Li, ALG Rios, L Trajković - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Denial of service attacks are harmful cyberattacks that diminish Internet resources and
services. Hence, detecting these cyberattacks is a topic of great interest in cybersecurity …

Security and privacy in IoT, Cloud and Augmented Reality

V Gandhi, KR Ramkumar, A Kaur… - … and Control (ISPCC), 2021 - ieeexplore.ieee.org
Internet of Things (IoT), Cloud and Augmented Reality (AR) are the emerging and
developing technologies and are at the horizon and hype of their life cycle. Lots of …

Robustness analysis of DNS paths and web access paths in public administration websites

A Bartoli - Computer Communications, 2021 - Elsevier
Attacks at the naming or the routing infrastructure of the Internet have long become a reality
and one single such attack has the potential of affecting access to Internet-facing services in …

Combining Particle Swarm Optimization and Entropy to Detect DDoS Attacks in the Cloud Computing

A Rezaeipanah, SE Mousavipoor… - Journal of Business …, 2021 - jbdsr.com
Cloud computing is an emerging technology that is widely used to provide computing, data
storage services and other remote resources over the Internet. Availability of cloud services …

an approach to detect DDoS attacks in the cloud computing environment using entropy and particle swarm optimization

M Asayeshjoo, M Sadeghzadeh… - Journal of Southern …, 2021 - jce.bushehr.iau.ir
Cloud computing is an emerging technology that is widely used to provide computing, data
storage services and other remote resources over the Internet. Availability of cloud services …

Enterprise Network Security via Data-driven Methods and Programmable Network Telemetry

M Lyu - 2021 - unsworks.unsw.edu.au
Enterprise networks are both complex and dynamic, with various kinds of servers (web,
email, VPN, storage), clients (fixed, wireless), and Internet-of-Things devices (cameras …

رویکردی برای تشخیص حملات DDoS در محیط رایانش ابری با استفاده از آنتروپی و بهینه‌سازی ازدحام ذرات

آسایش جو, صادق زاده, گنجو - مهندسی مخابرات جنوب, 2021‎ - journals.iau.ir
رایانش ابری یک فناوری نوظهور و در حال رشد است که به طور گسترده برای ارائه محاسبات، خدمات
ذخیره‌سازی و سایر منابع از طریق اینترنت استفاده می‌شود. در دسترس بودن سرویس‌های ابری یکی …