An enhanced mechanism for detection of Domain Name System-based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques

[1]  Evolving Dynamic Fuzzy Clustering (EDFC) to Enhance DRDoS_DNS Attacks Detection Mechnism , 2022, International Journal of Intelligent Engineering and Systems.

[2]  V. Dora,et al.  Optimal feature selection with CNN-feature learning for DDoS attack detection using meta-heuristic-based LSTM , 2022, International Journal of Intelligent Robotics and Applications.

[3]  Ramchandra S. Mangrulkar,et al.  TaxoDaCML: Taxonomy based Divide and Conquer using machine learning approach for DDoS attack classification , 2021, Int. J. Inf. Manag. Data Insights.

[4]  Niall M. Adams,et al.  Multi-type relational clustering for enterprise cyber-security networks , 2021, Pattern Recognit. Lett..

[5]  Kazim Yildiz,et al.  Detection of DDoS attacks with feed forward based deep neural network model , 2021, Expert Syst. Appl..

[6]  Ivan Zelinka,et al.  Applications of swarm intelligence algorithms countering the cyber threats , 2020, GECCO Companion.

[7]  Florian Skopik,et al.  System log clustering approaches for cyber security applications: A survey , 2020, Comput. Secur..

[8]  Saurabh Singh,et al.  SMO-DNN: Spider Monkey Optimization and Deep Neural Network Hybrid Classifier Model for Intrusion Detection , 2020, Electronics.

[9]  Awais Ahmad,et al.  Nature-inspired algorithm-based secure data dissemination framework for smart city networks , 2020, Neural Computing and Applications.

[10]  Yogesh Kumar Dwivedi,et al.  Prevention of cybercrimes in smart cities of India: from a citizen's perspective , 2019, Inf. Technol. People.

[11]  Aida Mustapha,et al.  Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods , 2019, IEEE Access.

[12]  Mahmood Hussain Shah,et al.  Information security management needs more holistic approach: A literature review , 2016, Int. J. Inf. Manag..

[13]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[14]  Yudong Zhang,et al.  A Comprehensive Survey on Particle Swarm Optimization Algorithm and Its Applications , 2015 .

[15]  Mourad Debbabi,et al.  Inferring distributed reflection denial of service attacks from darknet , 2015, Comput. Commun..

[16]  Julian Jang,et al.  A survey of emerging threats in cybersecurity , 2014, J. Comput. Syst. Sci..

[17]  Rutvij H. Jhaveri,et al.  Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection , 2021, Secur. Commun. Networks.

[18]  Ricardo Soto,et al.  Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic Review , 2021 .

[19]  Dejan Dovzan,et al.  Large-scale cyber attacks monitoring using Evolving Cauchy Possibilistic Clustering , 2018, Appl. Soft Comput..