Semi-supervised machine learning approach for DDoS detection
Abstract Even though advanced Machine Learning (ML) techniques have been adopted for
DDoS detection, the attack remains a major threat of the Internet. Most of the existing ML …
DDoS detection, the attack remains a major threat of the Internet. Most of the existing ML …
Detection system of HTTP DDoS attacks in a cloud environment based on information theoretic entropy and random forest
Cloud Computing services are often delivered through HTTP protocol. This facilitates access
to services and reduces costs for both providers and end‐users. However, this increases the …
to services and reduces costs for both providers and end‐users. However, this increases the …
[PDF][PDF] Anomalies Classification Approach for Network-based Intrusion Detection System.
Anomaly based intrusion detection system (A-IDS) is considered to be a better option than
signature based system since it does not require prior knowledge of attack signature before …
signature based system since it does not require prior knowledge of attack signature before …
An enhanced entropy approach to detect and prevent DDoS in cloud environment
N Jeyanthi, NCSN Iyengar, PCM Kumar… - International …, 2013 - search.proquest.com
Abstract Distributed Denial of Service (DDoS) attack launched in Cloud computing
environment resulted in loss of sensitive information, Data corruption and even rarely lead to …
environment resulted in loss of sensitive information, Data corruption and even rarely lead to …
Entropy-based anomaly detection in a network
AS Shukla, R Maurya - Wireless Personal Communications, 2018 - Springer
Every computer on the Internet these days is a potential target for a new attack at any
moment. In this paper we propose a method to enhance network security using entropy …
moment. In this paper we propose a method to enhance network security using entropy …
Detection of DDoS Attacks using Semi-Supervised based Machine Learning Approaches
Distributed denial of service or DDoS attack is a kind of network attack that is used to destroy
the normal operations of the server and its responses. There are several approaches …
the normal operations of the server and its responses. There are several approaches …
[PDF][PDF] Cuda based rabin-karp pattern matching for deep packet inspection on a multicore gpu
This paper presents a study of the improvement in efficiency of the Rabin-Karp
patternmatching algorithm based Deep Packet Inspection. NVIDIA GPU is programmed with …
patternmatching algorithm based Deep Packet Inspection. NVIDIA GPU is programmed with …
The conjectural framework for detecting DDoS attack using enhanced entropy based threshold technique (EEB-TT) in cloud environment
A major threat to cloud infrastructure network is distributed denial of service (DDoS) attacks.
It makes the resources unavailable for its anticipated users, which can be accomplished …
It makes the resources unavailable for its anticipated users, which can be accomplished …
[PDF][PDF] A comprehensive flow-based anomaly detection architecture using entropy calculation and machine learning classification
The network behavior analysis relies on the understanding of normal or acceptable behavior
characteristics in the network communication, in order to efficiently detect the anomalous …
characteristics in the network communication, in order to efficiently detect the anomalous …
[PDF][PDF] Semi supervised machine learning approaches for DDOS attack detection
MK Sri, K Vasanthi, KR Seshu, M Sravya - Int J Eng Sci Adv Technol …, 2023 - ijesat.com
ABSTRACT A network exploit known as a distributed denial of service (DDoS) attack is used
to disable a server's regular operations and responses. During the DDoS attack the …
to disable a server's regular operations and responses. During the DDoS attack the …