Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods

BA Khalaf, SA Mostafa, A Mustapha… - IEEE …, 2019 - ieeexplore.ieee.org
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks
is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks …

An adaptive protection of flooding attacks model for complex network environments

BA Khalaf, SA Mostafa, A Mustapha… - Security and …, 2021 - Wiley Online Library
Currently, online organizational resources and assets are potential targets of several types
of attack, the most common being flooding attacks. We consider the Distributed Denial of …

[PDF][PDF] Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis.

K Bobrovnikova, S Lysenko, P Gaj, V Martynyuk… - IntelITSIS, 2020 - ceur-ws.org
The dynamic growth of the number of cyberattacks, which perform destructive against the IoT
devices, forces the developers of anti-virus software to implement new methods and …

Deep neural network for detection of cyber attacks

M Komar, V Dorosh, G Hladiy… - 2018 IEEE First …, 2018 - ieeexplore.ieee.org
In this paper the approach for detection of cyber attacks is described. The approach is based
on deep neural network. The main goal of proposed approach is to detect unknown …

Towards Comparative Evaluation of DDoS Defences

A Otung, A Martin - … 15th International Conference on Security of …, 2022 - ieeexplore.ieee.org
DDoS defence evaluation provides a way to capture the usefulness of defensive solutions to
one of the most notorious Internet attacks of our computing generation. An alternative …

[PDF][PDF] Performance evaluation and analysis with code benchmarking and generative AI

A Berko, V Alieksieiev, A Dovbysh - 2024 - ceur-ws.org
This paper explores code benchmarking techniques and their integration with advanced
generative Artificial Intelligence (AI) models, emphasizing the need for continuous …

Modelling of the Intelligent Agent's Behavior Scheduler Based on Petri Nets and Ontological Approach

V Lytvyn, M Bublyk, V Vysotska… - … on Smart Information …, 2021 - ieeexplore.ieee.org
The article considers the development of a model of scheduling the behavior of an intelligent
agent based on its rational activity. The model construction is based on Petri nets and uses …

[PDF][PDF] Machine Learning Based Techniques for Cyberattacks Detection in the Internet of Things Infrastructure.

K Bobrovnikova, S Lysenko, I Hurman, A Kwiecien - IntelITSIS, 2022 - ceur-ws.org
The emergence of the concept of the Internet of Things has revolutionized many economic
sectors and areas of human activity. At the same time, the spread of the Internet of Things …

Розробка системи інформаційного захисту корпоративної мережі

ДВ Ніколаєнко - 2024 - openarchive.nure.ua
Анотація Розглянуто потенційні ризики та наслідки загроз, проведено аналіз різних
типів засобів інформаційного захисту в сучасних корпоративних мережах, розроблено …

An improved agent protection model for distributed denial of service flooding attack traffics

HKM Al-Husseini - 2021 - openaccess.altinbas.edu.tr
Distributed Denial of Service (DDoS) is the most common and dangers type of attack could
targeting the internet, web server, OSI model, and any devices have internet concoctions …