Detection of denial-of-service attacks based on computer vision techniques

Z Tan, A Jamdagni, X He, P Nanda… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A
variety of detection systems has been proposed to achieve this task. Unlike the existing …

Robust adaptive multivariate Hotelling's T2 control chart based on kernel density estimation for intrusion detection system

M Ahsan, M Mashuri, MH Lee, H Kuswanto… - Expert Systems with …, 2020 - Elsevier
The utilization of conventional multivariate control chart in network intrusion detection will
deal with two main problems. First, the high false alarm occurs due to the distribution of …

The application of multivariate statistical process monitoring in non-industrial processes

S Bersimis, A Sgora, S Psarakis - Quality Technology & …, 2018 - Taylor & Francis
Statistical process monitoring (SPM) techniques have been widely used in industry for many
decades in order to assess the process stability, as well as the final product quality …

Intrusion detection system for controller area network

V Tanksale - Cybersecurity, 2024 - Springer
The rapid expansion of intra-vehicle networks has increased the number of threats to such
networks. Most modern vehicles implement various physical and data-link layer …

Anomaly detection approaches for communication networks

M Thottan, G Liu, C Ji - Algorithms for next generation networks, 2010 - Springer
In recent years, network anomaly detection has become an important area for both
commercial interests as well as academic research. Applications of anomaly detection …

Denial-of-service attack detection based on multivariate correlation analysis

Z Tan, A Jamdagni, X He, P Nanda, RP Liu - … Information Processing: 18th …, 2011 - Springer
The reliability and availability of network services are being threatened by the growing
number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection …

Traffic anomaly detection in DDos flooding attack

Y Purwanto, B Rahardjo - 2014 8th International Conference …, 2014 - ieeexplore.ieee.org
Researches have been conducted to overcome Distributed Denial of Service (DDoS)
flooding attack. Beside the use of signature based detection, anomaly based detection is …

A new approach to dimensionality reduction for anomaly detection in data traffic

T Huang, H Sethu, N Kandasamy - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The monitoring and management of high-volume feature-rich traffic in large networks offers
significant challenges in storage, transmission, and computational costs. The predominant …

Benford's law behavior of Internet traffic

L Arshadi, AH Jahangir - Journal of Network and Computer Applications, 2014 - Elsevier
In this paper, we analyze the Internet traffic from a different point of view based on Benford's
law, an empirical law that describes the distribution of leading digits in a collection of …

Anomaly detection for controller area networks using long short-term memory

V Tanksale - IEEE Open Journal of Intelligent Transportation …, 2020 - ieeexplore.ieee.org
The rapid expansion of intra-vehicle networks has increased the number of threats to such
networks. Most modern vehicles implement various physical and data-link layer …