Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,069 Hits in 3.8 sec

Prediction of DDoS Attacksusing Machine Learning and Deep Learning Algorithms

2019 International journal of recent technology and engineering  
The DDoS attack is the most significant network-based attack in the domain of computer security that disrupts the internet traffic of the target server.  ...  This study mainly focuses to identify the advancements and research gaps in the development of efficient security algorithms addressing DDoS attacks in various ubiquitous network environments.  ...  In the context of resolving the problems of the statistical models in detecting and predicting DDoS attacks, the researchers have focused on the deep and machine learning algorithms to develop context-aware  ... 
doi:10.35940/ijrte.d8162.118419 fatcat:yrug2c32cfge3go6fatnpp2y2a

Towards Situational Awareness of Botnet Activity in the Internet of Things

Christopher D. McDermott, Andrei V. Petrovski, Farzan Majdani
2018 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)  
On September 20 2016 the Mirai botnet was used to perform an unprecedented 620 Gbps DDoS attack on security journalist Brian Krebs website krebsonsecurity.com [9] .  ...  leveraged to perform large scale DDoS attacks against targets on the Internet.  ... 
doi:10.1109/cybersa.2018.8551408 dblp:conf/cybersa/McDermottPM18 fatcat:ihsy2qmiwzfqxfleqguvctsofe

Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments

Ahamed Aljuhani
2021 IEEE Access  
Additionally, the paper discusses different DDoS defense systems based on ML techniques that make use of a virtualized environment, including cloud computing, software-defined network, and network functions  ...  In recent years, machine learning (ML) techniques have been widely used to prevent DDoS attacks.  ...  [81] proposedan attack-aware security provisioning approach for DDoS attack mitigation in the context of the SDN/NFV combination with a 5G network.  ... 
doi:10.1109/access.2021.3062909 fatcat:xtj576lfsffrbpiqyk2kv5wuam

Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing

Wanderson L Costa, Ariel L. C Portela, Rafael Lopes Gomes
2021 International Journal of Communication Networks and Information Security  
One of the existing problems of the SEs is the detection of Distributed Denial of Service (DDoS) attacks, due to the vulnerabilities of IoT devices.  ...  The experiments performed, using real network traffic, suggest that the proposed system reaches 99% of accuracy, while reduces the volume of data exchanged and the detection time.  ...  the network flows to detect DDoS attacks.  ... 
doi:10.54039/ijcnis.v13i3.5080 fatcat:uchepdwvhrgerntn3vsh4k6ns4

Analysis of Different Attacks on Software Defined Network and Approaches to Mitigate using Intelligent Techniques

P. Karthika, A. Karmel
2021 International Journal of Advanced Computer Science and Applications  
The detection of DDoS (Distributed Denial of Service) attacks is essential topic under network security.  ...  DDoS attacks cause network services to become unavailable by repeatedly flooding servers with unwanted traffic.  ...  DEEP LEARNING DDoS attacks are still the most common and lethal danger to current and next-generation network systems.  ... 
doi:10.14569/ijacsa.2021.0120938 fatcat:r5cm4po2rnashlmu54kz2bhpgu

Effective Attack Detection in Internet of Medical Things Smart Environment using a Deep Belief Neural Network

Manimurugan S, Saad Almutairi, Majed Mohammed Aborokbah, Naveen Chilamkurti, Subramaniam Ganesan, Rizwan Patan
2020 IEEE Access  
In this work, we have proposed a deep learning-based method Deep Belief Network (DBN) algorithm model for the intrusion detection system.  ...  Security and privacy are viewed as main problems in any technology's dependence on the IoT model. Privacy and security issues arise due to the different possible attacks caused by intruders.  ...  PROPOSED ALGORITHM AND PROPOSED METHODOLOGY (DEEP BELIEF NETWORK DBNs are generative techniques.  ... 
doi:10.1109/access.2020.2986013 fatcat:e4svv3od3jfsjavrowmqgvsaii

Botnet Detection in the Internet of Things using Deep Learning Approaches

Christopher D. McDermott, Farzan Majdani, Andrei V. Petrovski
2018 2018 International Joint Conference on Neural Networks (IJCNN)  
On September 20 2016 the Mirai botnet was used to perform an unprecedented 620 Gbps DDoS attack on security journalist Brian Krebs website krebsonsecurity.com [8] .  ...  An attacker (botmaster) then uses a command and control (C&C) server to remotely control the bots, forcing them to participate in DDoS attacks against targets on the Internet.  ... 
doi:10.1109/ijcnn.2018.8489489 dblp:conf/ijcnn/McDermottMP18 fatcat:tjl2u6unanf6dagt2gj43iabpe

An Exploratory Study of Cognitive Sciences Applied to Cybersecurity

Roberto O. Andrade, Walter Fuertes, María Cazares, Iván Ortiz-Garcés, Gustavo Navas
2022 Electronics  
papers chosen in a systematic literature review that was carried out using PRISMA methodology.  ...  For achieving this, we developed exploratory research based on two steps: (1) a text mining process to identify main interest areas of research in the cybersecurity field and (2) a valuable review of the  ...  thank the Universidad de las Fuerzas Armadas ESPE of Sangolquí, Ecuador, for the resources granted for the development of the research project entitled: "Detection and Mitigation of Social Engineering attacks  ... 
doi:10.3390/electronics11111692 fatcat:w64k5p6rc5at5ak6d4xfpuol5m

Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models

Muhammad Akhtar, Tao Feng
2022 EAI Endorsed Transactions on Scalable Information Systems  
Machine learning algorithms were trained to predict cyber-attack scores using data from prior cyber-attacks on an open source website.  ...  It is possible to predict the future by using machine learning. A cyber-attack detection system is depicted in this study using machine learning models.  ...  Author hope author's framework will aid in the development of context-aware IoT security solutions for sensitive use cases, such as healthcare.  ... 
doi:10.4108/eai.1-2-2022.173293 fatcat:gcw7ujjdfjccxhb7s4feovpwye

Machine Learning in IoT Security: Current Solutions and Future Challenges [article]

Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain
2019 arXiv   pre-print
The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives.  ...  The participating nodes in IoT networks are usually resource-constrained, which makes them luring targets for cyber attacks.  ...  As mentioned before, MQTT and CoAP are two of the most widely used telemetry protocols in IoT. Pacheco et al. [115] evaluated the effect of DDoS attack on generic IoT network that uses CoAP.  ... 
arXiv:1904.05735v1 fatcat:k5v6zad7lfhdrjngjmxgroafz4

Intelligent Traffic Management in Next-Generation Networks

Ons Aouedi, Kandaraj Piamrat, Benoît Parrein
2022 Future Internet  
These methods can model and learn network traffic behavior using training data/environments.  ...  The recent development of smart devices has lead to an explosion in data generation and heterogeneity.  ...  As a result, several ML models have been used for DDoS attack detection in the SDN environment. In this context, Ahmad et al.  ... 
doi:10.3390/fi14020044 fatcat:dx6leecgtfegdlao5aq6p6ouci

DEA: Anomaly Detection in Smart Environments using Artificial Intelligence

Diego A. B. Moreira, Humberto P. Marques, Joaquim Celestino Jr., Rafael L. Gomes, Aldri Santos, Michele Nogueira
2019 Latin American Network Operations and Management Symposium  
Within this context, this paper presents the DEA project, which aims to develop a system based on AI to monitor network traffic and to detect anomalies in smart environments, generating a profile of the  ...  network and detecting out of order behaviors (different from the behavior pattern).  ...  The final result of DEA project is an context-aware adaptive anomaly detection system based on AI.  ... 
dblp:conf/lanoms/MoreiraMCGSN19 fatcat:ua5fi63whjflvixfkkkmol2heq

Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks

Ana Serrano Mamolar, Zeeshan Pervez, Jose M. Alcaraz Calero, Asad Masood Khattak
2018 Computers & security  
A novel approach which significantly extends the capabilities of a commonly used IDS, to accurately identify attacking nodes in a 5G network, regardless of multiple network traffic encapsulations, has  ...  This paper focuses on addressing a transversal detection system to be able to protect at the same time, infrastructures, tenants and 5G users in both edge and core network segments of the 5G multitenant  ...  His current research focus is User Profiling, Ontology, Knowledge Management, and Context-aware Computing.  ... 
doi:10.1016/j.cose.2018.07.017 fatcat:rehm5346bfaxdfc2jhtuetvyfy

A Flow Based Anomaly Detection Approach with Feature Selection Method Against DDoS Attacks in SDNs

Mahmoud Said El Sayed, Nhien-An Le-Khac, Marianne A. Azer, Anca D. Jurcut
2022 IEEE Transactions on Cognitive Communications and Networking  
JES ÚS et al. [42] applied six ML algorithms, REP Tree, SVM, MLP, RF, J48 and Random Tree for DDoS attack detection under the SDN context.  ...  attacks without the awareness of the device's rightful owner.  ... 
doi:10.1109/tccn.2022.3186331 fatcat:f6bssjotwbexnjqngtq7hyo624

CoAP-DoS: An IoT Network Intrusion Dataset [article]

Jared Mathews, Prosenjit Chatterjee, Shankar Banik
2022 arXiv   pre-print
We develop a new data set by collecting network traffic from real CoAP denial of service attacks and compare the data on multiple different machine learning classifiers.  ...  There are many network traffic data sets but very few that focus on IoT network traffic. Within the IoT network data sets there is a lack of CoAP denial of service data.  ...  A model for classifying malicious attacks on patient enabled IoT context aware devices used in a devices medical situation and a CoAP/MQTT data set were developed in [13] .  ... 
arXiv:2206.14341v1 fatcat:rgaft3c22zgs3cfh5a7r6u7usa
« Previous Showing results 1 — 15 out of 2,069 results