Robinson et al., 2015 - Google Patents
Ranking of machine learning algorithms based on the performance in classifying DDoS attacksRobinson et al., 2015
- Document ID
- 1961992330856190950
- Author
- Robinson R
- Thomas C
- Publication year
- Publication venue
- 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS)
External Links
Snippet
Network Security has become one of the most important factors to consider as the Internet evolves. The most important attack which affects the availability of service is Distributed Denial of Service. The service disruption may cause substantial financial loss as well as …
- 238000010801 machine learning 0 title abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Robinson et al. | Ranking of machine learning algorithms based on the performance in classifying DDoS attacks | |
Hosseini et al. | The hybrid technique for DDoS detection with supervised learning algorithms | |
Almasoudy et al. | Differential evolution wrapper feature selection for intrusion detection system | |
Khalaf et al. | An adaptive protection of flooding attacks model for complex network environments | |
Vijayasarathy et al. | A system approach to network modeling for DDoS detection using a Naive Bayesian classifier | |
Abdullah et al. | Performance evaluation of a genetic algorithm based approach to network intrusion detection system | |
Ahmed et al. | Intrusion Detection System in Software-Defined Networks Using Machine Learning and Deep Learning Techniques--A Comprehensive Survey | |
Mehibs et al. | Proposed network intrusion detection system in cloud environment based on back propagation neural network | |
Mahbooba et al. | Trust in intrusion detection systems: an investigation of performance analysis for machine learning and deep learning models | |
Monshizadeh et al. | Performance evaluation of a combined anomaly detection platform | |
Maslan et al. | Feature selection for DDoS detection using classification machine learning techniques | |
Gadelrab et al. | BotCap: Machine learning approach for botnet detection based on statistical features | |
Buragohain et al. | Anomaly based DDoS attack detection | |
Coscia et al. | Automatic decision tree-based NIDPS ruleset generation for DoS/DDoS attacks | |
McCarthy et al. | Feature vulnerability and robustness assessment against adversarial machine learning attacks | |
Ibrahim et al. | Performance comparison of intrusion detection system using three different machine learning algorithms | |
Pinto et al. | Detecting DDoS attacks using a cascade of machine learning classifiers based on Random Forest and MLP-ANN | |
Hussain et al. | Enhanced protection for information and network using intrusion detection system | |
Gehri et al. | Towards generalizing machine learning models to detect command and control attack traffic | |
Rani et al. | Analysis of machine learning and deep learning intrusion detection system in internet of things network | |
Padhiar et al. | Performance evaluation of botnet detection using machine learning techniques | |
Babenko et al. | LVQ models of DDOS attacks identification | |
Sinha et al. | Mining anomalies in large ISCX dataset using machine learning algorithms in KNIME | |
Protic et al. | WK-FNN design for detection of anomalies in the computer network traffic | |
Vargheese et al. | Machine Learning for Enhanced Cyber Security |