DDoS attack and detection methods in internet-enabled networks: Concept, research perspectives, and challenges

KB Adedeji, AM Abu-Mahfouz, AM Kurien - Journal of Sensor and …, 2023 - mdpi.com
In recent times, distributed denial of service (DDoS) has been one of the most prevalent
security threats in internet-enabled networks, with many internet of things (IoT) devices …

Named data networking: a survey

D Saxena, V Raychoudhury, N Suri, C Becker… - Computer Science …, 2016 - Elsevier
Internet was developed as a packet data network where users and data sources (server)
with specific IP addresses interacted over a pre-established communication channel. This …

A robust SVM-based approach with feature selection and outliers detection for classification problems

M Baldomero-Naranjo, LI Martínez-Merino… - Expert Systems with …, 2021 - Elsevier
This paper proposes a robust classification model, based on support vector machine (SVM),
which simultaneously deals with outliers detection and feature selection. The classifier is …

An Effective Two-Step Intrusion Detection Approach Based on Binary Classification and -NN

L Li, Y Yu, S Bai, Y Hou, X Chen - IEEE Access, 2017 - ieeexplore.ieee.org
Intrusion detection has been an important countermeasure to secure computing
infrastructures from malicious attacks. To improve detection performance and reduce bias …

Intrusion response systems: Foundations, design, and challenges

Z Inayat, A Gani, NB Anuar, MK Khan… - Journal of Network and …, 2016 - Elsevier
In the last few decades, various network attacks have emerged. This phenomenon requires
serious consideration to address its extensive consequences. To overcome the effects of …

Interest flooding attacks in named data networking: survey of existing solutions, open issues, requirements, and future directions

A Benmoussa, CA Kerrache, N Lagraa… - ACM Computing …, 2022 - dl.acm.org
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric
Networking. The NDN architecture adopts name-based routing and location-independent …

An anomaly-based intrusion detection system in presence of benign outliers with visualization capabilities

A Karami - Expert Systems with Applications, 2018 - Elsevier
Abnormal network traffic analysis through Intrusion Detection Systems (IDSs) and
visualization techniques has considerably become an important research topic to protect …

Self-organizing RBF neural network using an adaptive gradient multiobjective particle swarm optimization

H Han, X Wu, L Zhang, Y Tian… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
One of the major obstacles in using radial basis function (RBF) neural networks is the
convergence toward local minima instead of the global minima. For this reason, an adaptive …

Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection

S Dwivedi, M Vardhan, S Tripathi, AK Shukla - Evolutionary intelligence, 2020 - Springer
Intrusion detection has become important to network security because of the increasing
connectivity between computers and internet. Various Intrusion Detection Systems have …

Towards effective network intrusion detection: A hybrid model integrating gini index and GBDT with PSO

L Li, Y Yu, S Bai, J Cheng, X Chen - Journal of Sensors, 2018 - Wiley Online Library
In order to protect computing systems from malicious attacks, network intrusion detection
systems have become an important part in the security infrastructure. Recently, hybrid …