DDoS Attack Detection Method Based on V-Support Vector Machine
暂无分享,去创建一个
Jieren Cheng | Xiangyan Tang | Rui Cao | Wenxuan Tu | Dong Fan | Xiangyan Tang | Jieren Cheng | Dong Fan | Rui Cao | Wenxuan Tu
[1] Kejun Zhao,et al. A new C-RAN architecture based on RF signal soft-switching , 2016, Ann. des Télécommunications.
[2] Doo-Soon Park,et al. Network anomaly detection based on probabilistic analysis , 2018, Soft Comput..
[3] Jin Li,et al. Outsourcing computation of modular exponentiations in cloud computing , 2013, Cluster Computing.
[4] Daizhan Cheng,et al. On controllability and stabilizability of probabilistic Boolean control networks , 2012, Science China Information Sciences.
[5] Mohiuddin Ahmed,et al. Novel Approach for Network Traffic Pattern Analysis using Clustering-based Collective Anomaly Detection , 2015, Annals of Data Science.
[6] Jin Li,et al. Digital provenance: Enabling secure data forensics in cloud computing , 2014, Future Gener. Comput. Syst..
[7] Bayu Adhi Tama,et al. Data Mining Techniques in DoS/DDoS Attack Detection: A Literature Review , 2015 .
[8] Tanja Zseby,et al. Analysis of network traffic features for anomaly detection , 2014, Machine Learning.
[9] Vincent Lenders,et al. Gaining an Edge in Cyberspace with Advanced Situational Awareness , 2015, IEEE Security & Privacy.
[10] Pei-Yi Hao,et al. New support vector algorithms with parametric insensitive/margin model , 2010, Neural Networks.
[11] Ying-feng Zhang,et al. Study on Fault Classification of Power-Shift Steering Transmission Based on v-Support Vector Machine , 2013 .
[12] Haider Abbas,et al. Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems , 2016, Ann. des Télécommunications.
[13] Jianping Yin,et al. A change-point DDoS attack detection method based on half interaction anomaly degree , 2017, Int. J. Auton. Adapt. Commun. Syst..
[14] Mohammad Khubeb Siddiqui,et al. Analysis of KDD CUP 99 Dataset using Clustering based Data Mining , 2013 .
[15] Liu Yan-heng,et al. Dynamic entropy based DoS attack detection method , 2013 .
[16] Bernhard Schölkopf,et al. New Support Vector Algorithms , 2000, Neural Computation.
[17] Cleonilson Protásio de Souza,et al. A comparative study of use of Shannon, Rényi and Tsallis entropy for attribute selecting in network intrusion detection , 2011, M&N.
[18] Qiang Liu,et al. A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence , 2018, Comput. J..
[19] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[20] Munesh Chandra Trivedi,et al. DDA: An Approach to Handle DDoS (Ping Flood) Attack , 2016 .
[21] P. Kavitha,et al. Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier , 2016, Wirel. Networks.
[22] V. Sheng,et al. An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment , 2018 .
[23] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[24] Sunny Behal,et al. Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review , 2017, Int. J. Netw. Secur..
[25] Paul C. Gilmore. The lambda-gamma calculus: A language adequate for defining recursive functions , 1970, Inf. Sci..
[26] Witawas Srisa-an,et al. Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.
[27] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[28] Zhen Zhang,et al. Uncovering network traffic anomalies based on their sparse distributions , 2014, Science China Information Sciences.
[29] G. Aghila,et al. A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[30] Jin Li,et al. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..