Filters








16 Hits in 1.6 sec

LUCID: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinez-del-Rincon, D. Siracusa
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/iouxmlaqyjgpnp3dp5ddv4d2um" style="color: black;">IEEE Transactions on Network and Service Management</a> </i> &nbsp;
In this paper, we present a practical, lightweight deep learning DDoS detection system called LUCID, which exploits the properties of Convolutional Neural Networks (CNNs) to classify traffic flows as either  ...  The challenge of DDoS detection is the combination of attack approaches coupled with the volume of live traffic to be analysed.  ...  For the experiments, we used Tensorflow 1.9.0 with GPU support enabled by cuDNN, a GPU-accelerated library for deep neural networks [75] . A.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tnsm.2020.2971776">doi:10.1109/tnsm.2020.2971776</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/m5xmi4f7qbaudck6ejsj2ionme">fatcat:m5xmi4f7qbaudck6ejsj2ionme</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200506190255/https://pureadmin.qub.ac.uk/ws/files/200160837/LUCID_PUBLIC_VERSION.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/30/0e/300ec1dedf0da0756aa7d2207e2aa40d5529efe2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tnsm.2020.2971776"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

On Procedural Adversarial Noise Attack And Defense [article]

Jun Yan and Xiaoyang Deng and Huilin Yin and Wancheng Ge
<span title="2021-08-27">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Deep Neural Networks (DNNs) are vulnerable to adversarial examples which would inveigle neural networks to make prediction errors with small perturbations on the input images.  ...  In our framework, the shading which disturbs visual classification is generated with rendering technology.  ...  are two effective methods that help improve the robustness of the neural network models.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.04409v2">arXiv:2108.04409v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fxtrtwktbjclfitm53c32go6zi">fatcat:fxtrtwktbjclfitm53c32go6zi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210831145044/https://arxiv.org/pdf/2108.04409v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ee/24/ee24b822762e40aa6c1345f21edda926915db0b0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2108.04409v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Towards Effective Detection of Recent DDoS Attacks: A Deep Learning Approach

Ivandro Ortet Lopes, Deqing Zou, Francis A Ruambo, Saeed Akbar, Bin Yuan, Wenjuan Li
<span title="2021-11-30">2021</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
To address the issues mentioned earlier, we propose CyDDoS, an integrated intrusion detection system (IDS) framework, which combines an ensemble of feature engineering algorithms with the deep neural network  ...  for training and evaluation.  ...  DeepDefense leverages Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN), which has proved to provide huge performance improvement in terms of accuracy when trained with a large dataset  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/5710028">doi:10.1155/2021/5710028</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/djzrdqvegjeoloaatel7auxx3y">fatcat:djzrdqvegjeoloaatel7auxx3y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220201030651/https://downloads.hindawi.com/journals/scn/2021/5710028.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/01/fa/01fa86a60a7a3cc39fb73d0bddc6bce264f1af89.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/5710028"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Benchmarking Adversarial Robustness [article]

Yinpeng Dong, Qi-An Fu, Xiao Yang, Tianyu Pang, Hang Su, Zihao Xiao, Jun Zhu
<span title="2019-12-26">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Deep neural networks are vulnerable to adversarial examples, which becomes one of the most important research problems in the development of deep learning.  ...  After briefly reviewing plenty of representative attack and defense methods, we perform large-scale experiments with two robustness curves as the fair-minded evaluation criteria to fully understand the  ...  Deep defense: Training dnns with improved adversarial robust- ness.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1912.11852v1">arXiv:1912.11852v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/aamzg5ajlnb27brph52rmd4era">fatcat:aamzg5ajlnb27brph52rmd4era</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200928081852/https://arxiv.org/pdf/1912.11852v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/0c/7d0c27d1c71056ae5de054b876aaba429d83dee1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1912.11852v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Opportunities and Challenges in Deep Learning Adversarial Robustness: A Survey [article]

Samuel Henrique Silva, Peyman Najafirad
<span title="2020-07-03">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We survey the most recent and important results in adversarial example generation, defense mechanisms with adversarial (re)Training as their main defense against perturbations.  ...  We provide a taxonomy to classify adversarial attacks and defenses, formulate the Robust Optimization problem in a min-max setting and divide it into 3 subcategories, namely: Adversarial (re)Training,  ...  In [109] , the authors propose an attack-free and scalable method to train robust deep neural networks. They mostly build upon Randomized Smoothing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.00753v2">arXiv:2007.00753v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6xjcd5kinzeevleev26jpj4mym">fatcat:6xjcd5kinzeevleev26jpj4mym</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200710064916/https://arxiv.org/pdf/2007.00753v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/3d/a53dd7f3a7590a2058372410820c8086be109ec8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.00753v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization

Odnan Ref Sanchez, Matteo Repetto, Alessandro Carrega, Raffaele Bolla
<span title="2021-06-16">2021</span> <i title="Zenodo"> Zenodo </i> &nbsp;
Distributed Denial of Service (DDoS) attacks disrupt global network services by mainly overwhelming the host victim with requests originating from multiple traffic sources.  ...  Our evaluation shows that most algorithms provide satisfactory results, with Random Forests achieving as high as 99% of detection accuracy, which is comparable to existing deep learning approaches.  ...  For the 2012 dataset, DLDDoS [6] use Deep Neural Networks (DNN), LUCID [7] and TR-IDS [17] used CNNs, while we show the best result of DeepDefense [10] using LSTM.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4967296">doi:10.5281/zenodo.4967296</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kbl3kw6tnjbxrmuzopuxm7cp64">fatcat:kbl3kw6tnjbxrmuzopuxm7cp64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210617175326/https://zenodo.org/record/4967296/files/secsoft2021-2-2-1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2a/fd/2afd9e96561dfea12ec715d1a963385133f1ecd4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.4967296"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Detecting Malicious DNS Queries Over Encrypted Tunnels Using Statistical Analysis and Bi-Directional Recurrent Neural Networks

Mohammad Al-Fawa'reh, Zain Ashi, Mousa Tayseer Jafar
<span title="2021-12-06">2021</span> <i title="University of Kerbala - KIJOMS"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ficyg5ozvndvxfrnspypy3arxm" style="color: black;">Karbala International Journal of Modern Science</a> </i> &nbsp;
wavelet algorithm and the robustness of the neural reduction, with an accuracy rate of 98.410%.  ...  Wang, Improved probabilistic neural tacks in large campus networks, Int. J. Adv. Trends Comput. networks with self-adaptive strategies for transformer fault Sci.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.33640/2405-609x.3155">doi:10.33640/2405-609x.3155</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/shd27ytlvndirjdkrrykgjejou">fatcat:shd27ytlvndirjdkrrykgjejou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211211060821/https://kijoms.uokerbala.edu.iq/cgi/viewcontent.cgi?article=3155&amp;context=home" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fc/c8/fcc870d35c38db55c9534872126354ad28c05d06.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.33640/2405-609x.3155"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Revisiting Hilbert-Schmidt Information Bottleneck for Adversarial Robustness [article]

Zifeng Wang, Tong Jian, Aria Masoomi, Stratis Ioannidis, Jennifer Dy
<span title="2021-10-26">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We investigate the HSIC (Hilbert-Schmidt independence criterion) bottleneck as a regularizer for learning an adversarially robust deep neural network classifier.  ...  both with and without adversarial examples during training.  ...  Introduction Adversarial attacks [9, 18, 19, 3, 6] to deep neural networks (DNNs) have received considerable attention recently.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.02734v2">arXiv:2106.02734v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/q4b45ttwljhzxg45qgfpnr3j7i">fatcat:q4b45ttwljhzxg45qgfpnr3j7i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211104091836/https://arxiv.org/pdf/2106.02734v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/38/50/385071fab0d24315be38d6f0dae237dd8092484a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.02734v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Intelligent Techniques for Detecting Network Attacks: Review and Research Directions

Malak Aljabri, Sumayh S. Aljameel, Rami Mustafa A. Mohammad, Sultan H. Almotiri, Samiha Mirza, Fatima M. Anis, Menna Aboulnour, Dorieh M. Alomari, Dina H. Alhamed, Hanan S. Altamimi
<span title="2021-10-25">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks.  ...  In the literature, there are various descriptions of network attack detection systems involving various intelligent-based techniques including machine learning (ML) and deep learning (DL) models.  ...  MLP was a layered feed-forward ANN network typically trained with backpropagation. Accuracy was a goal that largely improved the overall effectiveness of the IDS.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21217070">doi:10.3390/s21217070</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/34770375">pmid:34770375</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC8587628/">pmcid:PMC8587628</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tnedw4hhcze7foqps3jfpiog7u">fatcat:tnedw4hhcze7foqps3jfpiog7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211116203902/https://mdpi-res.com/d_attachment/sensors/sensors-21-07070/article_deploy/sensors-21-07070-v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/97/e297f79894abf58350f296bfc87455a8bd1fe219.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s21217070"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8587628" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments

Ahamed Aljuhani
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
More specifically, a DDoS attack aims to disrupt and deny services to legitimate users by overwhelming the target with a massive number of malicious requests.  ...  INDEX TERMS DDoS attacks and detection, Internet of Things (IoT), machine learning (ML), network functions virtualization (NFV), software-defined network (SDN).  ...  [40] proposed a deep learning detection approach known as DeepDefense. They designed a recurrent deep neural network to learn behavior from a large-scale network traffic dataset.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3062909">doi:10.1109/access.2021.3062909</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xtj576lfsffrbpiqyk2kv5wuam">fatcat:xtj576lfsffrbpiqyk2kv5wuam</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210321005124/https://ieeexplore.ieee.org/ielx7/6287639/9312710/09366480.pdf?tp=&amp;arnumber=9366480&amp;isnumber=9312710&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5a/b3/5ab3e23c1f2da86c838bfcae77cc5ee2a70fdb3b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3062909"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Methods and Techniques for Dynamic Deployability of Software-Defined Security Services [article]

Roberto Doriguzzi-Corin
<span title="2020-04-04">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
, and (ii) novel methods based on Deep Learning and Linux kernel technologies for reducing the CPU usage of software-based security network functions, with specific focus on the defence against Distributed  ...  and enterprise networks have started replacing dedicated hardware-based middleboxes with virtualised network functions running on servers and end hosts.  ...  For the experiments, we used Tensorflow 1.9.0 with GPU support enabled by cuDNN, a GPUaccelerated library for deep neural networks [93] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2004.02876v1">arXiv:2004.02876v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/apaxjkq3qzb6ragrpt3izpucpa">fatcat:apaxjkq3qzb6ragrpt3izpucpa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200410221118/https://arxiv.org/pdf/2004.02876v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2004.02876v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Evolutionary Algorithm-Based and Network Architecture Search-Enabled Multiobjective Traffic Classification

Xiaojuan Wang, Xinlei Wang, Lei Jin, Renjian Lv, Bingying Dai, Mingshu He, Tianqi Lv
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
ACKNOWLEDGMENT The authors are grateful to the editor and anonymous reviewers for their suggestions in improving the quality of the paper.  ...  existing hand-crafted neural networks  ...  Her research interests include deep learning, complex networks, and human gesture recognition.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3068267">doi:10.1109/access.2021.3068267</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oo7h4ec63rflti62zpkmx7jm2u">fatcat:oo7h4ec63rflti62zpkmx7jm2u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210715020957/https://ieeexplore.ieee.org/ielx7/6287639/6514899/09383257.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/70/44/7044ae105f1366640fe1126c820f08e5248d2a46.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2021.3068267"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

An Effective Mechanism to Mitigate Real-time DDoS Attack Using Dataset

Rana Abubakar, Abdulaziz Aldegheishem, Muhammad Faran Majeed, Amjad Mehmood, Hafsa Maryam, Nabil Alrajeh, Maple Carsten, Muhammad Jawad
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
We present the algorithm with experimental results that show better performance than simple Snort IPS, Probabilistic Neural Network (PNN), Back Propagation (BP), Chi-square, and PSO-SVM in terms of accuracy  ...  The proposed research involves an optimized SVM classification algorithm integrated with SNORT IPS to provide prevention mechanisms for the entire network when subject to DDoS attack.  ...  The DeepDefense model is a collection of Recurrent Neural Network (RNN), CNN, and entirely connected layers of ANN.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2995820">doi:10.1109/access.2020.2995820</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pf7lidnsdvh57j5wu2ed5egxga">fatcat:pf7lidnsdvh57j5wu2ed5egxga</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429161630/https://ieeexplore.ieee.org/ielx7/6287639/8948470/09097187.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/40/6d40301b540313cf50f6b097c7e058f37cadecaa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2020.2995820"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Distributed Denial-of-Service (DDoS) Attacks and Defence Mechanisms in Various Web-enabled Computing Platforms

<span title="">2022</span> <i title="IGI Global"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/w7bkxef3rfcbrfixzvv2ignqf4" style="color: black;">International Journal on Semantic Web and Information Systems (IJSWIS)</a> </i> &nbsp;
In this exposition, we present a DDoS threat analysis along with a few novel ground-breaking defense mechanisms proposed by various researchers for numerous domains.  ...  The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities.  ...  Improving the security and management of smart contracts with robust technologies, like deep learning, also needs to be explored (Wen et al., 2021) . 6.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4018/ijswis.297143">doi:10.4018/ijswis.297143</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/imoau72665dxbmfdoxvntbyyiq">fatcat:imoau72665dxbmfdoxvntbyyiq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220520035259/https://www.igi-global.com/viewtitle.aspx?TitleId=297143&amp;isxn=9781799893967" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/55/9b/559b106f6a3c643b5bfb354b7564b9ea2164102c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4018/ijswis.297143"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Methods and Techniques for Dynamic Deployability of Software-Defined Security Services

Roberto Doriguzzi Corin
<span title="">2020</span>
, and (ii) novel methods based on Deep Learning and Linux kernel technologies for reducing the CPU usage of software-based security network functions, with specific focus on the defence against Distributed  ...  and enterprise networks have started replacing dedicated hardware-based middleboxes with virtualised network functions running on servers and end hosts.  ...  For the experiments, we used Tensorflow 1.9.0 with GPU support enabled by cuDNN, a GPUaccelerated library for deep neural networks [93] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6092/unibo/amsdottorato/9208">doi:10.6092/unibo/amsdottorato/9208</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3tcito3ue5cgfpzmsj4ntokmwq">fatcat:3tcito3ue5cgfpzmsj4ntokmwq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200815135747/http://amsdottorato.unibo.it/9208/1/Roberto-Doriguzzi-Corin-PhD-Thesis-FINAL-VERSION.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6092/unibo/amsdottorato/9208"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 16 results