Machine Learning Techniques Used in Detection of DOS Attacks: A Literature Review
暂无分享,去创建一个
[1] Vipin Das,et al. Network Intrusion Detection System Based On Machine Learning Algorithms , 2010 .
[2] Norbik Bashah Idris,et al. Anomaly intrusion detection based on fuzzy logic and data mining , 2006 .
[3] S. Mercy Shalinie,et al. Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset , 2011, 2011 Third International Conference on Advanced Computing.
[4] S. Saraswathi. Fuzzy Based Detection and Prediction of DDoS Attacks in IEEE 802.15.4 Low Rate Wireless Personal Area Network , 2013 .
[5] Rajagopalan Vijayasarathy,et al. A system approach to network modeling for DDoS detection using a Naìve Bayesian classifier , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[6] Kapil Sharma,et al. Intrusion Detection System with Multi Layer using Bayesian Networks , 2013 .
[7] M. Iqbal Saripan,et al. Detection of Denial of Service Attacks against Domain Name System Using Neural Networks , 2009, ArXiv.
[8] Vasilios Katos,et al. Real time DDoS detection using fuzzy estimators , 2012, Comput. Secur..
[9] Dhanalakshmi Srinivasan,et al. NETWORK INTRUSION DETECTION USING HIDDEN NAIVE BAYES MULTICLASS CLASSIFIER MODEL , 2014 .
[10] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[11] C. Emilin Shyni,et al. DoS Attack Detection Based on Naive Bayes Classifier , 2015 .
[12] Pankaj Salunkhe,et al. Denial-Of -Service Attack Detection Using KDD , 2015 .
[13] Claire Cardie,et al. Proceedings of the Eighteenth International Conference on Machine Learning, 2001, p. 577–584. Constrained K-means Clustering with Background Knowledge , 2022 .
[14] Hoda Waguih,et al. A Data Mining Approach for the Detection of Denial of Service Attack , 2013 .
[15] Ruhi Kabra,et al. Layered architecture for DoS attack detection system by combine approach of Naive bayes and Improved K-means Clustering Algorithm , 2015 .
[16] Gopinath Ganapathy,et al. A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment , 2014, Int. J. Commun. Networks Inf. Secur..
[17] Mohammed Salem,et al. Identifying DOS attacks using data pattern analysis , 2008 .
[18] Rung Ching Chen,et al. Using Rough Set and Support Vector Machine for Network Intrusion Detection System , 2009, 2009 First Asian Conference on Intelligent Information and Database Systems.
[19] Wuu Yang,et al. DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.
[20] S J Ghule,et al. Network Intrusion Detection System using Fuzzy Logic , 2014 .
[21] Ghazi Al-Naymat,et al. Detecting Distributed Denial of Service Attacks Using Data Mining Techniques , 2016 .
[22] Gopinath Ganapathy,et al. A Fuzzy Logic based Defense Mechanism against Distributed Denial of Service Attack in Cloud Computing Environment , 2014 .
[23] Chittur,et al. Model Generation for an Intrusion Detection System Using Genetic Algorithms , 2001 .
[24] David J. Miller,et al. Botnet Detection Through Fine Flow Classification , 2011 .
[25] Tawfiq Barhoom,et al. An Approach for Detecting and Preventing DoS Attacks in LAN , 2014 .
[26] V. Naveenantony Raj. NETWORK INTRUSION DETECTION USING HIDDEN NAIVE BAYES MULTICLASS CLASSIFIER MODEL , 2014 .
[27] T. Subbulakshmi,et al. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS , 2013 .
[28] G. Cem,et al. Denial-of-Service Attack Detection , 2014 .
[29] Madhav Kale,et al. DDOS Attack Detection Based on an Ensemble of Neural Classifier , 2014 .
[30] Ivan Shabalin,et al. The MP13 approach to the KDD'99 classifier learning contest , 2000, SKDD.
[31] Dewan Md. Farid,et al. Attacks classification in adaptive intrusion detection using decision tree , 2010 .
[32] Md. Abu Naser Bikas,et al. An Implementation of Intrusion Detection System Using Genetic Algorithm , 2012, ArXiv.
[33] M. Wahengbam,et al. Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.