Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks have been increasing, thereby leading to an urgent need for new attack identification, mitigation, and prevention mechanisms. To prevent DDoS attacks, the basic features of the attacks need to be dynamically analyzed because their patterns, ports, and protocols or operation mechanisms are rapidly changed and manipulated. Most of the proposed DDoS defense methods have different types of drawbacks and limitations. Some of these methods have signature-based defense mechanisms that fail to identify new attacks and others have anomaly-based defense mechanisms that are limited to specific types of DDoS attacks and yet to be applied in open environments. Subsequently, extensive research on applying artificial intelligence and statistical techniques in the defense methods has been conducted in order to identify, mitigate, and prevent these attacks. However, the most appropriate and effective defense features, mechanisms, techniques, and methods for handling such attacks remain to be an open question. This review paper focuses on the most common defense methods against DDoS attacks that adopt artificial intelligence and statistical approaches. Additionally, the review classifies and illustrates the attack types, the testing properties, the evaluation methods and the testing datasets that are utilized in the methodology of the proposed defense methods. Finally, this review provides a guideline and possible points of encampments for developing improved solution models of defense methods against DDoS attacks. INDEX TERMS DDoS attack, DDoS defense, artificial intelligence technique, statistical technique.
The optimal generation scheduling (OGS) of hydropower units holds an important position in electric power systems, which is significantly investigated as a research issue. Hydropower has a slight social and ecological effect when compared with other types of sustainable power source. The target of long-, mid-, and short-term hydro scheduling (LMSTHS) problems is to optimize the power generation schedule of the accessible hydropower units, which generate maximum energy by utilizing the available potential during a specific period. Numerous traditional optimization procedures are first presented for making a solution to the LMSTHS problem. Lately, various optimization approaches, which have been assigned as a procedure based on experiences, have been executed to get the optimal solution of the generation scheduling of hydro systems. This article offers a complete survey of the implementation of various methods to get the OGS of hydro systems by examining the executed methods from various perspectives. Optimal solutions obtained by a collection of meta-heuristic optimization methods for various experience cases are established, and the presented methods are compared according to the case study, limitation of parameters, optimization techniques, and consideration of the main goal. Previous studies are mostly focused on hydro scheduling that is based on a reservoir of hydropower plants. Future study aspects are also considered, which are presented as the key issue surrounding the LMSTHS problem.
A Mobile Ad-Hoc Network (MANET) is made up of wireless mobile nodes that do not require a central infrastructure or administration to establish a network. It is possible for the MANET nodes to function as a router or host. MANET works with an independent multi-hop mobile network which can be used in several real-time applications. Thus, an important issue associated with MANET is the identification of paths with high-level Quality of Service (QoS), like topology. The purpose of having a QoS-aware protocol in MANETs is to enable the discovery of paths that are more efficient between the source and destination nodes of the network and hence, the need for QoS. In this paper, a novel algorithm which can be used in the African Buffalo Optimization (ABO) to improve the QoS of routing protocol MANETs. With ABO, path selection is optimized in the Ad-hoc On-demand Distance Vector (AODV) routing protocol. Results of the test revealed that when ABO is used in AODV, delay and energy-aware routing protocol is manifested.
Numerous non-profit driven establishments depend on volunteers to help achieve their administrative targets. Despite the fact that volunteers work side-by-side or now and again substitute representatives in delivering services, inputting volunteer work into non-profit ventures of delivering services presents remarkable difficulties. Understanding these difficulties provides a significant fundamental building step in comprehending the influence these challenges have on service developmental plans and operations when utilizing volunteers. In this study, the paper brings forward a Charity Fundraising Information System (CFIS) framework and presents the modelling and evaluation of a plan and operational variables applicable to volunteer fulfilment in non-profit driven organizations. Discoveries indicate that fulfilled volunteers are bound to stay longer with the same establishment, give monetarily to the non-profit driven organization, and prescribe the volunteer involvement to other people. Every one of these results guarantees the continuous sustenance of the non-profit driven establishment.
Intrusion detection systems (IDS) are used in analyzing huge data and diagnose anomaly traffic such as DDoS attack; thus, an efficient traffic classification method is necessary for the IDS. The IDS models attempt to decrease false alarm and increase true alarm rates in order to improve the performance accuracy of the system. To resolve this concern, three machine learning algorithms have been tested and evaluated in this research which are decision jungle (DJ), random forest (RF) and support vector machine (SVM). The main objective is to propose a ML-based network intrusion detection system (ML-based NIDS) model that compares the performance of the three algorithms based on their accuracy and precision of anomaly traffics. The knowledge discovery in databases (KDD) methodology and intrusion detection evaluation dataset (CIC-IDS2017) are used in the testing which both are considered as a benchmark in the evaluation of IDS. The average accuracy results of the SVM is 98.18%, RF is 96.76% and DJ is 96.50% in which the highest accuracy is achieved by the SVM. The average precision results of the SVM is 98.74, RF is 97.96 and DJ is 97.82 in which the SVM got a higher average precision compared with the other two algorithms. The average recall results of the SVM is 95.63, RF is 97.62 and DJ is 95.77 in which the RF achieves the highest average of recall than SVM and DJ. In overall, the SVM algorithm is found to be the best algorithm that can be used to detect an intrusion in the system.
The filtered orthogonal frequency division multiplexing (F-OFDM) system has been recommended as a waveform candidate for fifth-generation (5G) communications.The suppression of out-of-band emission (OOBE) and asynchronous transmission are the distinctive features of the filtering-based waveform frameworks. Meanwhile, the high peak-to-average power ratio (PAPR) is still a challenge for the new waveform candidates. Partial transmit sequence (PTS) is an effective technique for mitigating the trend of high PAPR in multicarrier systems. In this study, the PTS technique is employed to reduce the high PAPR value of an F-OFDM system. Then, this system is compared with the OFDM system. In addition, the other related parameters such as frequency localization, bit error rate (BER), and computational complexity are evaluated and analyzed for both systems with and without PTS. The simulation results indicate that the F-OFDM based on PTS achieves higher levels of PAPR, BER, and OOBE performances compared with OFDM. Moreover, the BER performance of F-OFDM is uninfluenced by the use of the PTS technique.
scite is a Brooklyn-based startup that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2023 scite Inc. All rights reserved.
Made with 💙 for researchers