[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

An ADS-PAYG approach using trust factor Against economic denial of sustainability attacks in cloud storage

A Karthika, N Muthukumaran - Wireless Personal Communications, 2022 - Springer
Cloud computing is a global technology for data storage and retrieving. Many organizations
are switching their companies to cloud technology, so that they can lease cloud services for …

[PDF][PDF] Cyber Security Management: A Review.

K Jenab, S Moslehpour - Business Management Dynamics, 2016 - researchgate.net
Cyber Security Management: A Review Page 1 Business Management Dynamics Vol.5, No.11,
May 2016, pp.16-39 ©Society for Business and Management Dynamics Cyber Security …

Application layer DDoS attack detection using cuckoo search algorithm-trained radial basis function

H Beitollahi, DM Sharif, M Fazeli - IEEE Access, 2022 - ieeexplore.ieee.org
In an application-layer distributed denial of service (App-DDoS) attack, zombie computers
bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot …

A novel trust model for secure group communication in distributed computing

N Ramu, V Pandi, JD Lazarus… - … of Organizational and …, 2020 - igi-global.com
Distributed networks are networks in which each node can act as a server or client and
hence any node can provide service to any other node. In such a scenario, establishing a …

Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder

S Yadav, S Subramanian - 2016 international conference on …, 2016 - ieeexplore.ieee.org
An Application Layer Distributed Denial of Service Attack (DDoS) is one of the biggest
concerns for web security. Many detection methods are designed to mitigate DDoS attack …

A software-defined networking (SDN) approach to mitigating DDoS attacks

H D'Cruze, P Wang, RO Sbeit, A Ray - Information Technology-New …, 2018 - Springer
Abstract Distributed Denial of Service (DDoS) attacks are a common threat to network
security. Traditional mitigation approaches have significant limitations in addressing DDoS …

User behavior analytics-based classification of application layer HTTP-GET flood attacks

K Singh, P Singh, K Kumar - Journal of Network and Computer Applications, 2018 - Elsevier
Web services are one of the most prominent forms of web presence exercised by the
businesses to connect to their possible client base. GET flood attacks, commonly known as …

[HTML][HTML] BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web

KM Prasad, ARM Reddy, KV Rao - … of King Saud University-Computer and …, 2020 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) Attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …

An evolutionary KNN model for DDoS assault detection using genetic algorithm based optimization

F Rizvi, R Sharma, N Sharma, M Rakhra… - Multimedia Tools and …, 2024 - Springer
Abstract Distributed Denial of Service (DDoS) attacks continue to pose a significant threat to
network infrastructures, exploiting vulnerabilities within existing security protocols and …