[HTML][HTML] One-Parameter Statistical Methods to Recognize DDoS Attacks

R Hajtmanek, M Kontšek, J Smieško, J Uramová - Symmetry, 2022 - mdpi.com
Within our academic high-speed network infrastructure which is used for connecting all
universities and high schools in our country to the Internet, there are thousands of …

[HTML][HTML] MFGAD-INT: in-band network telemetry data-driven anomaly detection using multi-feature fusion graph deep learning

Y Duan, C Li, G Bai, G Chen, F Zhou, J Chen… - Journal of Cloud …, 2023 - Springer
As the cloud services market grows, cloud management tools that detect network anomalies
in a non-intrusive manner are critical to improve users' experience of cloud services …

DDoS Attack Forensics Pattern Identification using Entropy and Hurst Coefficient based Fusion Model

M Solanki, S Chaudhari - 2023 IEEE 8th International …, 2023 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) is a very common network attack that involves the
continuous flooding of request packets from adversaries to clog the network servers. An …

Automated deployment of the OpenStack platform

M Moravcik, P Segec - 2023 21st International Conference on …, 2023 - ieeexplore.ieee.org
The aim of the paper is to analyze the necessary support services in the environment of the
KIS department, which will serve to simplify the management of computing power and its …