Distributed Denial of Service detection using hybrid machine learning technique
暂无分享,去创建一个
Nur Izura Udzir | Azizol Abdullah | Ramlan Mahmod | Norwati Mustapha | Mehdi Barati | N. Mustapha | Azizol Abdullah | R. Mahmod | N. Udzir | M. Barati
[1] Myung-Sup Kim,et al. Traffic Flooding Attack Detection on SNMP MIB Using SVM , 2008 .
[2] Jinjun Chen,et al. A confidence-based filtering method for DDoS attack defense in cloud environment , 2013, Future Gener. Comput. Syst..
[3] Shui Yu. Malicious Networks for DDoS Attacks , 2014 .
[4] Elidon Beqiri,et al. Neural Networks for Intrusion Detection Systems , 2009 .
[5] A. Sima Etaner-Uyar,et al. Detection of DDoS Attacks via an Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm , 2010, EvoApplications.
[6] Carol J. Fung. Collaborative Intrusion Detection Networks and Insider Attacks , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[7] J. M. Kizza. System Intrusion Detection and Prevention , 2015 .
[8] William Eberle,et al. Genetic algorithms in feature and instance selection , 2013, Knowl. Based Syst..
[9] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[10] Bon K. Sy. Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS , 2009, Inf. Fusion.
[11] Anikó Ekárt,et al. Genetic algorithms in computer aided design , 2003, Comput. Aided Des..
[12] Wanlei Zhou,et al. Detection and defense of application-layer DDoS attacks in backbone web traffic , 2014, Future Gener. Comput. Syst..
[13] Ruchuan Wang,et al. DDoS detection based on wavelet kernel support vector machine , 2008 .
[14] Theodore Tryfonas,et al. A game theoretic defence framework against DoS/DDoS cyber attacks , 2013, Comput. Secur..
[15] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[16] Shui Yu,et al. Distributed Denial of Service Attack and Defense , 2013, SpringerBriefs in Computer Science.
[17] Geert Deconinck,et al. Tackling Application-layer DDoS Attacks , 2012, ANT/MobiWIS.
[18] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..