2018
DOI: 10.1093/comjnl/bxy025
|View full text |Cite
|
Sign up to set email alerts
|

A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…In simple terms, remote sensing image feature discretization is to adopt a specific method to divide a continuous feature interval on the image into a limited number of cells, then to associate these cells with a set of discrete values. The discretization of continuous features (also called continuous attributes) is an important preprocessing step for data mining and machine learning, and is directly related to the effect of mining or learning [6,19].…”
Section: Remote Sensing Image Feature Discretizationmentioning
confidence: 99%
“…In simple terms, remote sensing image feature discretization is to adopt a specific method to divide a continuous feature interval on the image into a limited number of cells, then to associate these cells with a set of discrete values. The discretization of continuous features (also called continuous attributes) is an important preprocessing step for data mining and machine learning, and is directly related to the effect of mining or learning [6,19].…”
Section: Remote Sensing Image Feature Discretizationmentioning
confidence: 99%
“…Moreover, the idea of provided attack detection is vaguely presented. There are more investigations that are dedicated to the specific type of the attacks [27], [28]. Bhattacharya and Selvakumar [27] suggested a multi-measure multi-weight ranking approach for the identification of the network features for the detection of denial of service (DoS) and probe attacks.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…The approach combines the filter and wrapper feature selection methods and clustering methods to assign multiple weights to each feature. Cheng et al [28] proposed a DDoS detection method for socially aware networking based on the time-series autoregressive integrated moving average model. The model describes a multi-protocol-fusion feature to characterize normal network flows.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Only unsigned integer types are accepted. • NOTIFY: if an email is specified, an error is thrown if the address does not comply with the email Internet Message Format RFC2822 Standard [23], using the validators of the Apache Commons project 8 . The existence of the email domain is also checked, although only a warning is reported if not found for the same reasons we did with IPs or DNS names.…”
Section: 941 * Errors Found When Checking Specified Abstract In Outmentioning
confidence: 99%
“…They may be performed over private companies, public institutions, or military infrastructures [4]. Consequences may be varied: steal user information [5], alter the normal behavior of services [6][7][8], data hijacking [9], or taking control of an infrastructure to perform malicious activities [10]. Both web applications and their hosting servers are very common attack targets [11].…”
Section: Introductionmentioning
confidence: 99%