An improved rule induction based denial of service attacks classification model
暂无分享,去创建一个
Ibrahim Almarashdeh | Malek Alzaqebah | Mutasem K. Alsmadi | Rami Mustafa A. Mohammad | M. Alsmadi | Ibrahim Almarashdeh | R. Mohammad | M. Alzaqebah
[1] Shin-Ming Cheng,et al. DDoS Attacks in Experimental LTE Networks , 2020, AINA Workshops.
[2] Vikash Kumar,et al. Statistical Analysis of the UNSW-NB15 Dataset for Intrusion Detection , 2019, Computational Intelligence in Pattern Recognition.
[3] Rami Mustafa A. Mohammad,et al. A lifelong spam emails classification model , 2020, Applied Computing and Informatics.
[4] Wuu Yang,et al. DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.
[5] Sherali Zeadally,et al. Using Cloud Computing to Implement a Security Overlay Network , 2013, IEEE Security & Privacy.
[6] Fouad Amine Guenane,et al. DDOS Mitigation Cloud-Based Service , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[7] Rodrigo Braga,et al. Lightweight DDoS flooding attack detection using NOX/OpenFlow , 2010, IEEE Local Computer Network Conference.
[8] Shahrzad Zargari,et al. Feature selection in UNSW-NB15 and KDDCUP'99 datasets , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).
[9] Khaled Salah. A Queueing Model to Achieve Proper Elasticity for Cloud Cluster Jobs , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[10] Xin Xu,et al. Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.
[11] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[12] Akihiro Nakao,et al. DDoS defense as a network service , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[13] Rami Mustafa A. Mohammad,et al. A Neural Network based Digital Forensics Classification , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).
[14] Ajith Abraham,et al. A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment , 2013, Int. J. Distributed Sens. Networks.
[15] Lei Wei,et al. FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[16] Nur Izura Udzir,et al. A Cloud-based Intrusion Detection Service framework , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[17] Narmeen Zakaria Bawany,et al. DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions , 2017, Arabian Journal for Science and Engineering.
[18] Richard E. Overill,et al. Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.
[19] Jordi Torres,et al. Adaptive distributed mechanism against flooding network attacks based on machine learning , 2008, AISec '08.
[20] Yan Li,et al. An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment , 2017, IEEE Access.
[21] Khaled Salah,et al. Efficient and dynamic scaling of fog nodes for IoT devices , 2017, The Journal of Supercomputing.
[22] Rabindra K. Barik,et al. A deep learning based intelligent framework to mitigate DDoS attack in fog environment , 2019, J. King Saud Univ. Comput. Inf. Sci..
[23] Rami M. Mohammad,et al. An Enhanced Multiclass Support Vector Machine Model and its Application to Classifying File Systems Affected by a Digital Crime , 2019, J. King Saud Univ. Comput. Inf. Sci..
[24] Sung Y. Shin,et al. Smart IoT monitoring framework based on oneM2M for fog computing , 2018, SAC.
[25] Jadzia Cendrowska,et al. PRISM: An Algorithm for Inducing Modular Rules , 1987, Int. J. Man Mach. Stud..
[26] Marc St-Hilaire,et al. Early detection of DDoS attacks against SDN controllers , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[27] A. Nur Zincir-Heywood,et al. Supervised learning to detect DDoS attacks , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[28] Vitaly Klyuev,et al. An Intelligent DDoS Attack Detection System Using Packet Analysis and Support Vector Machine , 2014 .
[29] Yongdae Kim,et al. A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[30] Nour Moustafa,et al. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set) , 2015, 2015 Military Communications and Information Systems Conference (MilCIS).
[31] Rami M. Mohammad,et al. A comparison of machine learning techniques for file system forensics analysis , 2019, J. Inf. Secur. Appl..
[32] Khaled Salah,et al. Industrial internet of things: Recent advances, enabling technologies and open challenges , 2020, Comput. Electr. Eng..
[33] S. Mercy Shalinie,et al. Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset , 2011, 2011 Third International Conference on Advanced Computing.
[34] Davide Anguita,et al. Big Data Analytics in the Cloud: Spark on Hadoop vs MPI/OpenMP on Beowulf , 2015, INNS Conference on Big Data.
[35] Jan Vykopal,et al. Future of DDoS Attacks Mitigation in Software Defined Networks , 2014, AIMS.
[36] Yuan Zhang,et al. DDoS Attacks Detection Using Machine Learning Algorithms , 2018, IFTC.
[37] Jieren Cheng,et al. Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning , 2018, Secur. Commun. Networks.
[38] Max Bramer,et al. Improving Modular Classification Rule Induction with G-Prism Using Dynamic Rule Term Boundaries , 2017, SGAI Conf..
[39] Jin Ye,et al. A DDoS Attack Detection Method Based on SVM in Software Defined Network , 2018, Secur. Commun. Networks.
[40] Angelos Stavrou,et al. 20 Years of DDoS: a Call to Action , 2019, ArXiv.
[41] Ada Gavrilovska,et al. Towards IoT-DDoS Prevention Using Edge Computing , 2018, HotEdge.
[42] Raja Srinivasa Reddy Boddu,et al. Waikato Environment for Knowledge Analysis , 2019 .
[43] Brij B. Gupta,et al. A Comprehensive Survey on DDoS Attacks and Recent Defense Mechanisms , 2020 .
[44] Ghazi Al-Naymat,et al. Detecting Distributed Denial of Service Attacks Using Data Mining Techniques , 2016 .
[45] Shashank Srivastava,et al. Research Trends in Security and DDoS in SDN , 2016, Secur. Commun. Networks.
[46] Nick Feamster,et al. Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[47] Michela Antonelli,et al. A novel associative classification model based on a fuzzy frequent pattern mining algorithm , 2015, Expert Syst. Appl..
[48] Hyogon Kim,et al. Controller scheduling for continued SDN operation under DDoS attacks , 2015 .
[49] Gurpreet Singh,et al. Prediction of Coronary Heart Disease using Machine Learning: An Experimental Analysis , 2019, ICDLT.
[50] Song Guo,et al. Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.
[51] Ruby B. Lee,et al. Machine Learning Based DDoS Attack Detection from Source Side in Cloud , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[52] Khaled Salah,et al. Impact of CPU Utilization Thresholds and Scaling Size on Autoscaling Cloud Resources , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.