A comprehensive survey on DDoS defense systems: New trends and challenges

Q Li, H Huang, R Li, J Lv, Z Yuan, L Ma, Y Han… - Computer Networks, 2023 - Elsevier
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …

[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions

JPA Yaacoub, HN Noura, O Salman - Internet of Things and Cyber-Physical …, 2023 - Elsevier
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …

[PDF][PDF] Generative Adversarial Networks (GAN) for Cyber Security: Challenges and Opportunities

S Tasneem, KD Gupta, A Roy… - Proceedings of the 2022 …, 2022 - researchgate.net
Generative Adversarial Network (GAN) investigations highlight new vulnerabilities and
challenges to machine learning models' security and privacy. Different AI/ML applications …

An adversarial DBN-LSTM method for detecting and defending against DDoS attacks in SDN environments

L Chen, Z Wang, R Huo, T Huang - Algorithms, 2023 - mdpi.com
As an essential piece of infrastructure supporting cyberspace security technology
verification, network weapons and equipment testing, attack defense confrontation drills, and …

Open-Set Recognition in Unknown DDoS Attacks Detection with Reciprocal Points Learning

CS Shieh, FA Ho, MF Horng, TT Nguyen… - IEEE …, 2024 - ieeexplore.ieee.org
The internet, a cornerstone of modern life, has profound implications across personal,
business, and society. However, its widespread use has posed challenges, especially …

One-Parameter Statistical Methods to Recognize DDoS Attacks

R Hajtmanek, M Kontšek, J Smieško, J Uramová - Symmetry, 2022 - mdpi.com
Within our academic high-speed network infrastructure which is used for connecting all
universities and high schools in our country to the Internet, there are thousands of …

Analyze textual data: deep neural network for adversarial inversion attack in wireless networks

MA Al Ghamdi - SN Applied Sciences, 2023 - Springer
Deep neural networks (DNN) are highly effective in a number of tasks related to machine
learning across different domains. It is quite challenging to apply the information gained to …

Machine Recognition of DDoS Attacks Using Statistical Parameters

J Smiesko, P Segec, M Kontsek - Mathematics, 2023 - mdpi.com
As part of the research in the recently ended project SANET II, we were trying to create a
new machine-learning system without a teacher. This system was designed to recognize …

[PDF][PDF] Enhancing Cloud Security: An Optimization-based Deep Learning Model for Detecting Denial-of-Service Attacks

L Alhazmi - International Journal of Advanced Computer Science …, 2023 - academia.edu
DoS (Denial-of-Service) attacks pose an imminent threat to cloud services and could cause
significant financial and intellectual damage to cloud service providers and their customers …

EXPLORING A NOVEL FRAMEWORK FOR DOS/DDOS ATTACK DETECTION AND SIMULATION IN CONTEMPORARY NETWORKS.

GS Rao, PK SUBBARAO - i-manager's Journal on Software …, 2024 - search.ebscohost.com
Currently, the internet serves as the predominant means of communication and is utilized by
a vast number of individuals worldwide. Simultaneously, the commercial aspect of the …