Multischeme feedforward artificial neural network architecture for DDoS attack detection
暂无分享,去创建一个
[1] Philip K. Chan,et al. Machine Learning for IT Security , 2010, Encyclopedia of Machine Learning and Data Mining.
[2] Michael Negnevitsky,et al. Artificial Intelligence: A Guide to Intelligent Systems , 2001 .
[3] Pourya Shamsolmoali,et al. Statistical-based filtering system against DDOS attacks in cloud computing , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[4] Sunny Behal,et al. Characterization and comparison of Distributed Denial of Service attack tools , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).
[5] Tao Ban,et al. Detection of DDoS Backscatter Based on Traffic Features of Darknet TCP Packets , 2014, 2014 Ninth Asia Joint Conference on Information Security.
[6] Angelo Spognardi,et al. A taxonomy of distributed denial of service attacks , 2017, 2017 International Conference on Information Society (i-Society).
[7] Kai Qian,et al. A Neural-Network Based DDoS Detection System Using Hadoop and HBase , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[8] Lakhmi C. Jain. Recent Advances in Artificial Neural Networks , 2000 .
[9] Kim-Kwang Raymond Choo,et al. An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.
[10] Jenq-Neng Hwang,et al. Handbook of Neural Network Signal Processing , 2000, IEEE Transactions on Neural Networks.
[11] Vugar E. Ismailov,et al. On the approximation by neural networks with bounded number of neurons in hidden layers , 2014 .
[12] Nathan Shone,et al. Predicting the Effects of DDoS Attacks on a Network of Critical Infrastructures , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[13] Jill Slay,et al. Novel Geometric Area Analysis Technique for Anomaly Detection Using Trapezoidal Area Estimation on Large-Scale Networks , 2019, IEEE Transactions on Big Data.
[14] Leonard Barolli,et al. Application of Neural Networks for Intrusion Detection in Tor Networks , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[15] Marjan Kuchaki Rafsanjani,et al. Distributed denial of service attacks and detection mechanisms , 2014, J. Comput. Methods Sci. Eng..
[16] Tao Ban,et al. A neural network model for detecting DDoS attacks using darknet traffic features , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[17] Thelma D. Palaoag,et al. Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack , 2018 .
[18] Peter L. Bartlett,et al. Neural Network Learning - Theoretical Foundations , 1999 .
[19] Simon Haykin,et al. Neural Networks and Learning Machines , 2010 .
[20] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[21] Seifedine Kadry,et al. A new framework to alleviate DDoS vulnerabilities in cloud computing , 2019 .
[22] Kim-Kwang Raymond Choo,et al. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..
[23] Kim-Kwang Raymond Choo,et al. Change-point cloud DDoS detection using packet inter-arrival time , 2016, 2016 8th Computer Science and Electronic Engineering (CEEC).