Network intrusion detection via flow-to-image conversion and vision transformer classification

CMK Ho, KC Yow, Z Zhu, S Aravamuthan - IEEE Access, 2022 - ieeexplore.ieee.org
In recent years, computer networks have become an indispensable part of our life, and these
networks are vulnerable to various type of network attacks, compromising the security of our …

An overview of DoS and DDoS attack detection techniques

M Gniewkowski - … Conference on Dependability and Complex Systems, 2020 - Springer
The economic impact of (distributed) denial-of-service attacks is substantial, especially at a
time when we rely on web applications more and more often. That is why, it is essential to be …

iReTADS: An Intelligent Real‐Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network

GS Lalotra, V Kumar, A Bhatt, T Chen… - Security and …, 2022 - Wiley Online Library
A new distributed environment at less financial expenditure on communication over the
Internet is presented by cloud computing. In recent times, the increased number of users has …

DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory

Y Chen, X Ma, X Wu - IEEE Communications Letters, 2013 - ieeexplore.ieee.org
Distributed denial-of-service (DDoS) flooding attacks still pose great threats to the Internet
even though various approaches and systems have been proposed. In this paper, we firstly …

Improved network traffic by attacking denial of service to protect resource using Z-test based 4-tier geomark traceback (Z4TGT)

K Ganesh Kumar, S Sengan - Wireless Personal Communications, 2020 - Springer
Network security plays a vital role in protecting the resources available in the network
against various threats. There are vulnerabilities in every system connected to the network …

Network traffic forecasting model based on long-term intuitionistic fuzzy time series

X Fan, Y Wang, M Zhang - Information sciences, 2020 - Elsevier
In this paper, a network traffic forecasting model based on long-term intuitionistic fuzzy time
series (LT-IFTS) is proposed. It describes the fuzziness and uncertainty of network flow and …

Detection of distributed denial of service attacks based on information theoretic approach in time series models

J David, C Thomas - Journal of Information Security and Applications, 2020 - Elsevier
DDoS is becoming one of the most powerful and dangerous cyber-attacks. Tremendous
research efforts have already been carried out in the detection of DDoS attacks. Entropy is a …

Identification of monthly municipal water demand system based on autoregressive integrated moving average model tuned by particle swarm optimization

S Boubaker - Journal of Hydroinformatics, 2017 - iwaponline.com
In this paper, a modeling-identification approach for the monthly municipal water demand
system in Hail region, Saudi Arabia, is developed. This approach is based on an auto …

Improving the performance of public transport bus services: analytics approach to revenue forecasting

MA Ben Rabia, A Bellabdaoui - International Conference on Digital …, 2023 - Springer
With the current energy crisis and the increase in the price of petroleum products, public bus
transportation is an unavoidable choice for many vehicle users. Public bus companies face …

A chaotic complexity measure for cognitive machine classification of cyber-attacks on computer networks

MS Khan, K Ferens, W Kinsner - International Journal of Cognitive …, 2014 - igi-global.com
Today's evolving cyber security threats demand new, modern, and cognitive computing
approaches to network security systems. In the early years of the Internet, a simple packet …