Semi-supervised machine learning approach for DDoS detection

M Idhammad, K Afdel, M Belouch - Applied Intelligence, 2018 - Springer
Abstract Even though advanced Machine Learning (ML) techniques have been adopted for
DDoS detection, the attack remains a major threat of the Internet. Most of the existing ML …

Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest

M Idhammad, K Afdel, M Belouch - Security and …, 2018 - Wiley Online Library
Cloud Computing services are often delivered through HTTP protocol. This facilitates access
to services and reduces costs for both providers and end‐users. However, this increases the …

[PDF][PDF] Anomalies Classification Approach for Network-based Intrusion Detection System.

Q Qassim, AM Zin, MJ Ab Aziz - Int. J. Netw. Secur., 2016 - academia.edu
Anomaly based intrusion detection system (A-IDS) is considered to be a better option than
signature based system since it does not require prior knowledge of attack signature before …

An enhanced entropy approach to detect and prevent DDoS in cloud environment

N Jeyanthi, NCSN Iyengar, PCM Kumar… - International …, 2013 - search.proquest.com
Abstract Distributed Denial of Service (DDoS) attack launched in Cloud computing
environment resulted in loss of sensitive information, Data corruption and even rarely lead to …

Entropy-based anomaly detection in a network

AS Shukla, R Maurya - Wireless Personal Communications, 2018 - Springer
Every computer on the Internet these days is a potential target for a new attack at any
moment. In this paper we propose a method to enhance network security using entropy …

Detection of DDoS Attacks using Semi-Supervised based Machine Learning Approaches

U Garg, M Kaur, M Kaushik… - 2021 2nd International …, 2021 - ieeexplore.ieee.org
Distributed denial of service or DDoS attack is a kind of network attack that is used to destroy
the normal operations of the server and its responses. There are several approaches …

[PDF][PDF] Cuda based rabin-karp pattern matching for deep packet inspection on a multicore gpu

J Sharma, M Singh - International Journal of Computer Network and …, 2015 - mecs-press.org
This paper presents a study of the improvement in efficiency of the Rabin-Karp
patternmatching algorithm based Deep Packet Inspection. NVIDIA GPU is programmed with …

The conjectural framework for detecting DDoS attack using enhanced entropy based threshold technique (EEB-TT) in cloud environment

A Manimaran, M Durairaj - International Journal of Advanced …, 2016 - search.proquest.com
A major threat to cloud infrastructure network is distributed denial of service (DDoS) attacks.
It makes the resources unavailable for its anticipated users, which can be accomplished …

[PDF][PDF] A comprehensive flow-based anomaly detection architecture using entropy calculation and machine learning classification

J Ibrahim, V Timčenko, S Ga** - Proceedings of the 9th International …, 2019 - academia.edu
The network behavior analysis relies on the understanding of normal or acceptable behavior
characteristics in the network communication, in order to efficiently detect the anomalous …

[PDF][PDF] Semi supervised machine learning approaches for DDOS attack detection

MK Sri, K Vasanthi, KR Seshu, M Sravya - Int J Eng Sci Adv Technol …, 2023 - ijesat.com
ABSTRACT A network exploit known as a distributed denial of service (DDoS) attack is used
to disable a server's regular operations and responses. During the DDoS attack the …