A dynamic feature selection technique to detect DDoS attack

US Chanu, KJ Singh, YJ Chanu - Journal Of Information Security And …, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attacks are a weapon of choice for hackers
that are accountable for degradation in network performance, website downtime, and …

A survey on DDoS attack and defense strategies: from traditional schemes to current techniques

M Aamir, MA Zaidi - Interdisciplinary Information Sciences, 2013 - jstage.jst.go.jp
Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services.
Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of …

An approach of ddos attack detection using classifiers

KJ Singh, T De - … and Applications: ERCICA 2015, Volume 1, 2015 - Springer
To defend and protect web server from the attack, it is important to know the nature and the
behaviour of legitimate and illegitimate clients. It is also important to provide access to the …

[PDF][PDF] Internet do futuro: Um novo horizonte

MDD Moreira, NC Fernandes, L Costa… - Minicursos do Simpósio …, 2009 - academia.edu
O modelo da Internet atual possui dois pilares principais: o serviço fim-a-fim de
transferência de dados e o perfil de protocolos TCP/IP. Esse modelo facilitou e acelerou o …

Mitigating Distributed DoS Attacks on Bandwidth Allocation for Federated Learning in Mobile Edge Networks

Y Xu, S Zhang, C Lyu, J Liu, Y Shen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In mobile edge networks, federated learning (FL) has garnered substantial attention as a
distributed machine learning framework with significant advantages for protecting user …

[PDF][PDF] A DoS/DDoS attack detection system using chi-square statistic approach

FY Leu, IL Lin - J. Syst. Cybern. Inform, 2010 - iiisci.org
Nowadays, users can easily access and download network attack tools, which often provide
friendly interfaces and easily operated features, from the Internet. Therefore, even a naive …

[PDF][PDF] A novel approach of detection and mitigation of DDoS attack

KJ Singh, T De - International Conference on Computer Science, Data …, 2015 - iieng.org
We are in the era of internet and depend on it for every necessary requirement. It is the
tendency of the some human to have destructive approach rather than having constructive …

Application of MEMS as the hardware sensor on network access intrusion detection system using ALBA framework

E Navarro, AC Paglinawan - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Intrusion detection and protection system is one of the key factors that will make a company's
network more secure especially in accessing web-based systems. This research discusses …