5Ws model for big data analysis and visualization

J Zhang, ML Huang - 2013 IEEE 16th International Conference …, 2013 - ieeexplore.ieee.org
Big Data, which contains image, video, text, audio and other forms of data, collected from
multiple datasets, is difficult to process using traditional database management tools or …

DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment

M Haddadi, R Beghdad - Edpacs, 2018 - Taylor & Francis
Cloud computing has become a suitable provider of services for organizations as well as
individuals through the Internet. Generally, these services become unavailable because of …

Research on visualization systems for DDoS attack detection

C Wu, S Sheng, X Dong - 2018 IEEE International Conference …, 2018 - ieeexplore.ieee.org
Computer networks have been widely used and the network security is becoming a critical
issue due to the frequent attacks. Among these attacks, the DDoS attack is a destructive …

Density approach: a new model for BigData analysis and visualization

J Zhang, ML Huang - Concurrency and Computation: Practice …, 2016 - Wiley Online Library
In this paper, we extended our density model to BigData analysis and visualization. BigData,
which contains images, videos, texts, audio files and other forms of data collected from …

[PDF][PDF] A Tool for Visualization and Analysis of Distributed Denial-of-Service (DDoS) Attacks

L Boillat, J von der Assen, M Franco… - … Group, Department of …, 2020 - files.ifi.uzh.ch
Abstract Da DDoS Attacken in den letzten Jahren umfassender und heftiger wurden, wird
der Bedarf nach Analysen immer notwendiger, um einerseits Entwicklungen in …

[PDF][PDF] An efficient RREQ flooding attack avoidance technique for adaptive wireless network

DS Rao, PV Rao - International Journal of applied engineering …, 2016 - researchgate.net
Mobile Ad Hoc networks (MANETs) are wireless networks which is infrastructure less means
it does not require any central administrator for communication between mobile nodes. Due …

Detecting flood attacks through new density-pattern based approach

J Zhang, ML Huang - … & 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
Flood attacks are common threats to Internet, which has necessitated the need for visual
analysis within an intrusion detection system to identify these attacks patterns. The …

A Research on the Competitive Inhibitory Model of Network Defense Based on Resource Competition

J Li, HP Hu, J Pan, Y Zhao - Journal of Computational and …, 2015 - ingentaconnect.com
Preventing and guarding against network attack is a system engineering, the traditional
network defense focuses on the specific technical features of network attack, its universality …

Visual analysis and detection of network flood attacks through Two-Layer density approach

ML Huang, J Zhang - … of 2013 3rd International Conference on …, 2013 - ieeexplore.ieee.org
Flood attack patterns have variability depending on the network environment. It has been
necessitated that the need for visual analysis within an Intrusion Detection System (IDS) is to …

Research into DDoS attack detection based on a decision tree constructed in parallel on the basis of mutual information

C Zhao, HQ Wang, FF Guo, GN Hao - Electronic Engineering, 2018 - taylorfrancis.com
Distributed Denial of Service (DDoS) attacks (Jaber et al., 2015) use a large number of
computers distributed in different locations to simultaneously send a large number of …