Group testing: an information theory perspective

M Aldridge, O Johnson, J Scarlett - Foundations and Trends® …, 2019 - nowpublishers.com
The group testing problem concerns discovering a small number of defective items within a
large population by performing tests on pools of items. A test is positive if the pool contains …

Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling

HH Jazi, H Gonzalez, N Stakhanova, AA Ghorbani - Computer Networks, 2017 - Elsevier
A recent escalation of application layer Denial of Service (DoS) attacks on the Internet has
quickly shifted the interest of the research community traditionally focused on network-based …

An efficient DDoS TCP flood attack detection and prevention system in a cloud environment

A Sahi, D Lai, Y Li, M Diykh - IEEE Access, 2017 - ieeexplore.ieee.org
Although the number of cloud projects has dramatically increased over the last few years,
ensuring the availability and security of project data, services, and resources is still a crucial …

[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

Application-layer denial of service attacks: taxonomy and survey

G Mantas, N Stakhanova, H Gonzalez… - … of Information and …, 2015 - inderscienceonline.com
The recent escalation of application-layer denial of service (DoS) attacks has attracted a
significant interest of the security research community. Since application-layer DoS attacks …

Stealthy denial of service strategy in cloud computing

M Ficco, M Rak - IEEE transactions on cloud computing, 2014 - ieeexplore.ieee.org
The success of the cloud computing paradigm is due to its on-demand, self-service, and pay-
by-use nature. According to this paradigm, the effects of Denial of Service (DoS) attacks …

Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT)

K Ganesh Kumar, S Sengan - Wireless Personal Communications, 2020 - Springer
Network security plays a vital role in protecting the resources available in the network
against various threats. There are vulnerabilities in every system connected to the network …

User behavior analytics-based classification of application layer HTTP-GET flood attacks

K Singh, P Singh, K Kumar - Journal of Network and Computer Applications, 2018 - Elsevier
Web services are one of the most prominent forms of web presence exercised by the
businesses to connect to their possible client base. GET flood attacks, commonly known as …

[HTML][HTML] BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web

KM Prasad, ARM Reddy, KV Rao - … of King Saud University-Computer and …, 2020 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) Attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

Detection of application layer DDoS attack by modeling user behavior using logistic regression

S Yadav, S Selvakumar - 2015 4th International Conference on …, 2015 - ieeexplore.ieee.org
DDoS attack has been a threat to network security since a decade and it will continue to be
so in the near future also. Now a days application layer DDoS attack poses a major …