Tsfn: A novel malicious traffic classification method using bert and lstm

Z Shi, N Luktarhan, Y Song, H Yin - Entropy, 2023 - mdpi.com
Traffic classification is the first step in network anomaly detection and is essential to network
security. However, existing malicious traffic classification methods have several limitations; …

Optimized MLP-CNN model to enhance detecting DDoS attacks in SDN environment

MA Setitra, M Fan, BLY Agbley, ZEA Bensalem - Network, 2023 - mdpi.com
In the contemporary landscape, Distributed Denial of Service (DDoS) attacks have emerged
as an exceedingly pernicious threat, particularly in the context of network management …

P4-HLDMC: A novel framework for DDoS and ARP attack detection and mitigation in SD-IoT networks using machine learning, stateful P4, and distributed multi …

WI Khedr, AE Gouda, ER Mohamed - Mathematics, 2023 - mdpi.com
Distributed Denial of Service (DDoS) and Address Resolution Protocol (ARP) attacks pose
significant threats to the security of Software-Defined Internet of Things (SD-IoT) networks …

Detection of application-layer DDoS attacks using machine learning and genetic algorithms

DM Sharif, H Beitollahi - Computers & Security, 2023 - Elsevier
Abstract Application-layer Distributed Denial of Service (App-DDoS) attacks continue to be a
pervasive problem in cybersecurity, despite the availability of various defensive frameworks …

[HTML][HTML] A novel Hybrid Exhaustive Search and data preparation technique with multi-objective Discrete Hopfield Neural Network

A Alway, NE Zamri, MA Mansor… - Decision Analytics …, 2023 - Elsevier
The primary objective in building predictive analytics models is to achieve optimal accuracy
with real datasets. The limitations of existing models lie in their storage capacity, which …

Open-Set Recognition in Unknown DDoS Attacks Detection with Reciprocal Points Learning

CS Shieh, FA Ho, MF Horng, TT Nguyen… - IEEE …, 2024 - ieeexplore.ieee.org
The internet, a cornerstone of modern life, has profound implications across personal,
business, and society. However, its widespread use has posed challenges, especially …

An intrusion system for internet of things security breaches using machine learning techniques

TS Adekunle, OO Alabi, MO Lawrence… - Artificial Intelligence …, 2024 - ojs.bonviewpress.com
Effective identification and categorization of network attacks are paramount for ensuring
robust security. However, contemporary techniques often struggle to accurately discern and …

[PDF][PDF] Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss.

TL Nguyen, H Kao, TT Nguyen… - … , Materials & Continua, 2024 - cdn.techscience.cn
Since its inception, the Internet has been rapidly evolving. With the advancement of science
and technology and the explosive growth of the population, the demand for the Internet has …

Functional Subspace Variational Autoencoder for Domain-Adaptive Fault Diagnosis

T Li, CH Fung, HT Wong, TL Chan, H Hu - Mathematics, 2023 - mdpi.com
This paper presents the functional subspace variational autoencoder, a technique
addressing challenges in sensor data analysis in transportation systems, notably the …

Detection of application-layer DDoS attacks using machine learning and genetic algorithms

D Mohammed Sharif, H Beitollahi - 2023 - dl.acm.org
Abstract Application-layer Distributed Denial of Service (App-DDoS) attacks continue to be a
pervasive problem in cybersecurity, despite the availability of various defensive frameworks …