[HTML][HTML] HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm
I Sreeram, VPK Vuppala - Applied computing and informatics, 2019 - Elsevier
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …
which is one that intentionally occupies the computing resources and bandwidth in order to …
An ADS-PAYG approach using trust factor Against economic denial of sustainability attacks in cloud storage
A Karthika, N Muthukumaran - Wireless Personal Communications, 2022 - Springer
Cloud computing is a global technology for data storage and retrieving. Many organizations
are switching their companies to cloud technology, so that they can lease cloud services for …
are switching their companies to cloud technology, so that they can lease cloud services for …
[PDF][PDF] Cyber Security Management: A Review.
Cyber Security Management: A Review Page 1 Business Management Dynamics Vol.5, No.11,
May 2016, pp.16-39 ©Society for Business and Management Dynamics Cyber Security …
May 2016, pp.16-39 ©Society for Business and Management Dynamics Cyber Security …
Application layer DDoS attack detection using cuckoo search algorithm-trained radial basis function
In an application-layer distributed denial of service (App-DDoS) attack, zombie computers
bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot …
bring down the victim server with valid requests. Intrusion detection systems (IDS) cannot …
A novel trust model for secure group communication in distributed computing
N Ramu, V Pandi, JD Lazarus… - … of Organizational and …, 2020 - igi-global.com
Distributed networks are networks in which each node can act as a server or client and
hence any node can provide service to any other node. In such a scenario, establishing a …
hence any node can provide service to any other node. In such a scenario, establishing a …
Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder
S Yadav, S Subramanian - 2016 international conference on …, 2016 - ieeexplore.ieee.org
An Application Layer Distributed Denial of Service Attack (DDoS) is one of the biggest
concerns for web security. Many detection methods are designed to mitigate DDoS attack …
concerns for web security. Many detection methods are designed to mitigate DDoS attack …
A software-defined networking (SDN) approach to mitigating DDoS attacks
H D'Cruze, P Wang, RO Sbeit, A Ray - Information Technology-New …, 2018 - Springer
Abstract Distributed Denial of Service (DDoS) attacks are a common threat to network
security. Traditional mitigation approaches have significant limitations in addressing DDoS …
security. Traditional mitigation approaches have significant limitations in addressing DDoS …
User behavior analytics-based classification of application layer HTTP-GET flood attacks
Web services are one of the most prominent forms of web presence exercised by the
businesses to connect to their possible client base. GET flood attacks, commonly known as …
businesses to connect to their possible client base. GET flood attacks, commonly known as …
[HTML][HTML] BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web
The internet network is mostly victimized to the Distributed Denial of Service (DDOS) Attack,
which is one that intentionally occupies the computing resources and bandwidth in order to …
which is one that intentionally occupies the computing resources and bandwidth in order to …
An evolutionary KNN model for DDoS assault detection using genetic algorithm based optimization
Abstract Distributed Denial of Service (DDoS) attacks continue to pose a significant threat to
network infrastructures, exploiting vulnerabilities within existing security protocols and …
network infrastructures, exploiting vulnerabilities within existing security protocols and …