Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT)

K Ganesh Kumar, S Sengan - Wireless Personal Communications, 2020 - Springer
Network security plays a vital role in protecting the resources available in the network
against various threats. There are vulnerabilities in every system connected to the network …

A deep 1-D CNN and bidirectional LSTM ensemble model with arbitration mechanism for LDDoS attack detection

Z Liu, J Yu, B Yan, G Wang - IEEE Transactions on Emerging …, 2022 - ieeexplore.ieee.org
Low-rate Distributed Denial of Service (LDDoS) attacks are complex and common security
issues, which disrupt the essential services of the varied and emerging networks. However …

Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale (ECMHS) in traffic flow streams

DB Dasari, G Edamadaka, CS Chowdary… - Journal of Ambient …, 2021 - Springer
The exponential growth in the internet services lead to enormous growth in the network
traffic. As the services are increasing the numbers of network attacks are also gradually …

Detection of low-rate cloud DDoS attacks in frequency domain using fast hartley transform

N Agrawal, S Tapaswi - Wireless Personal Communications, 2020 - Springer
Abstract Distributed Denial-of-Service (DDoS) attack has been a serious threat to the
availability feature of cloud computing. As traditional DDoS attacks are implemented using a …

Efficient ensemble to combat flash attacks

OK CU, PRK Sathia Bhama - Computational Intelligence, 2024 - Wiley Online Library
Flash event generates enormous traffic and the cloud service providers use sustaining
techniques like scaling and content delivery network to up their services. One of the main …

Flow based anomaly intrusion detection system using ensemble classifier with Feature Impact Scale

V Jyothsna, KM Prasad, K Rajiv, GR Chandra - Cluster Computing, 2021 - Springer
The exponential growth of services in the internet with rapid development of technologies
results produces huge growth in the traffic, which maximizes the possibility of increase in …

[PDF][PDF] Implementation of DoS and DDoS attacks on cloud servers

S Mahjabin - Periodicals of Engineering and Natural Sciences, 2018 - pen.ius.edu.ba
Cloud environments face many threats as traditional corporate networks, but due to the vast
amount of data stored on cloud servers, providers become an attractive target. Thus the …

Identification of DDoS Attack using Blended Machine Learning Algorithms

R Jeevitha, K Chaitanya, N Mathesh… - … Computing and Data …, 2023 - ieeexplore.ieee.org
In bandwidth distributed denial-of-service (BW-DDoS with ADT-SVM) attacks, numerous
hosts send a large number of packets to clog the Internet and block genuine traffic, leaving it …

AVDR: a framework for migration policy to handle DDoS attacked VM in cloud

P Verma, S Tapaswi, WW Godfrey - Wireless Personal Communications, 2020 - Springer
The recent trends of Distributed Denial of Service (DDoS) attacks in cloud computing have
revealed a new menace of DDoS attacks called collateral damages on non-target …

Network traffic anomaly detection algorithm using mahout classifier

H Peng, L Liu, J Liu, JR Lewis - Journal of Intelligent & Fuzzy …, 2019 - content.iospress.com
Now, the classifier network anomaly traffic detection method is generally considered to be a
general method of good detection effect and high detection precision. In order to detect …