Identifying legitimate user in DDoS attack using Petri net

[1]  P. Chinnasamy,et al.  Detection of Distributed Denial of Service Attacks in SDN using Machine learning techniques , 2021, 2021 International Conference on Computer Communication and Informatics (ICCCI).

[2]  P. Chinnasamy,et al.  Analysis of Intruder Detection in Big Data Analytics , 2021, 2021 International Conference on Computer Communication and Informatics (ICCCI).

[3]  Gwanggil Jeon,et al.  Hybrid Approach for IP Traceback Analysis in Wireless Networks , 2020, Wirel. Pers. Commun..

[4]  V. Praveena,et al.  Complementary place transformation in Petri nets , 2018, 2018 International Conference on Soft-computing and Network Security (ICSNS).

[5]  Tan Hanh,et al.  FAST DETECTION OF DDOS ATTACKS USING NON -ADAPTIVE GROUP TESTING , 2013 .

[6]  N. Kiruthika,et al.  New Mitigating Technique to Overcome DDOS Attack , 2008 .

[7]  Aikaterini Mitrokotsa,et al.  DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.

[8]  Tadao Murata,et al.  Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.

[9]  James L. Peterson,et al.  Petri Nets , 1977, CSUR.

[10]  Ihsan Ali,et al.  Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs , 2022, Computers, Materials & Continua.

[11]  Devesh C. Jinwala,et al.  Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks , 2015, Int. J. Netw. Secur..

[12]  Divya Kuriakose V.Praveena A Survey on DDoS Attacks and DefenseApproaches , 2013 .

[13]  Gregory J. D'Angelo Tutorial on petri nets , 1983, SIML.