[PDF][PDF] The significance of machine learning and deep learning techniques in cybersecurity: A comprehensive review

MM Mijwil, IE Salem, MM Ismaeel - Iraqi Journal For Computer Science and …, 2023 - iasj.net
People in the modern era spend most of their lives in virtual environments that offer a range
of public and private services and social platforms. Therefore, these environments need to …

Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives

D Javaheri, S Gorgin, JA Lee, M Masdari - Information Sciences, 2023 - Elsevier
Nowadays, cybersecurity challenges and their ever-growing complexity are the main
concerns for various information technology-driven organizations and companies. Although …

Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks

A Yazdinejad, A Dehghantanha, RM Parizi… - Computers in …, 2023 - Elsevier
Integrating blockchain into the Internet of Things (IoT) for security is a new development in
computational communication systems. While security threats are changing their strategies …

Machine-learning-enabled ddos attacks detection in p4 programmable networks

F Musumeci, AC Fidanci, F Paolucci, F Cugini… - Journal of Network and …, 2022 - Springer
Abstract Distributed Denial of Service (DDoS) attacks represent a major concern in modern
Software Defined Networking (SDN), as SDN controllers are sensitive points of failures in …

SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches

R Rawat, B Garg, K Pachlasiya, V Mahor… - International Journal of …, 2022 - igi-global.com
Real-time network inspection applications face a threat of vulnerability as high-speed
networks continue to expand. For companies and ISPs, real-time traffic classification is an …

A hybrid machine learning approach for detecting unprecedented DDoS attacks

M Najafimehr, S Zarifzadeh, S Mostafavi - The Journal of Supercomputing, 2022 - Springer
Abstract Service availability plays a vital role on computer networks, against which
Distributed Denial of Service (DDoS) attacks are an increasingly growing threat each year …

A comprehensive survey on DDoS defense systems: New trends and challenges

Q Li, H Huang, R Li, J Lv, Z Yuan, L Ma, Y Han… - Computer Networks, 2023 - Elsevier
In the past ten years, the source of DDoS has migrated to botnets composed of IoT devices.
The scale of DDoS attacks increases dramatically with the number of IoT devices. New …

Performance and features: Mitigating the low-rate TCP-targeted DoS attack via SDN

D Tang, Y Yan, S Zhang, J Chen… - IEEE Journal on Selected …, 2021 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is an emerging network architecture. The decoupled
data and control plane provides programmability for efficient network management …

Detection and mitigation of low-rate denial-of-service attacks: A survey

VDM Rios, PRM Inácio, D Magoni, MM Freire - IEEE Access, 2022 - ieeexplore.ieee.org
The potential for being the target of Denial of Service (DoS) attacks is one of the most severe
security threats on the Internet. Attackers have been modifying their attack format over the …

[PDF][PDF] DDoS attack intrusion detection system based on hybridization of CNN and LSTM

ASA Issa, Z Albayrak - Acta Polytechnica Hungarica, 2023 - researchgate.net
A distributed denial-of-service (DDoS) attack is one of the most pernicious threats to network
security. DDoS attacks are considered one of the most common attacks among all network …