2020
DOI: 10.1051/e3sconf/202018401052
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of DDOS Attacks Using Machine Learning Techniques

Abstract: The DDoS attacks are the most destructive attacks that interrupt the safe operation of essential services delivered by the internet community’s different organizations. DDOS stands for Distributed Denial Of Service attacks. These attacks are becoming more complex and expected to expand in number day after day, rendering detecting and combating these threats challenging. Hence, an advanced intrusion detection system (IDS) is required to identify and recognize an- anomalous internet traffic behaviour. Within thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 7 publications
0
14
0
1
Order By: Relevance
“…Resilient backpropagation addresses this problem by calculating only the direction in which partial derivatives are used to change weights, resulting in less memory usage. [35].…”
Section: Resilient Backpropagation Training Algorithm Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Resilient backpropagation addresses this problem by calculating only the direction in which partial derivatives are used to change weights, resulting in less memory usage. [35].…”
Section: Resilient Backpropagation Training Algorithm Resultsmentioning
confidence: 99%
“…The direction of the gradient to the ministry must be determined in predefined intervals in the combined gradient algorithms. This strategy only shows the restart when the gradient output does not change minimally [35,36]. The recognition ( 19) is used to determine when the search direction must be reset to the sound level of the slope.…”
Section: Conjugate Gradient With Powell/beale Restart Training Algorithmmentioning
confidence: 99%
“…Em (Arshi et al, 2020), os autores utilizaram técnicas de Aprendizado de Máquina para identificação de ataques DDoS. Os tipos de ataques empregados no estudo foram: UDP Flood, ICMP (PING) Flood, Smurf Attack e HTTP Flood, e os algoritmos utilizados para classificação foram o Naive Bayes, SVM, Árvores de Decisão (Decision Tree), Rede Neural e K-means.…”
Section: Trabalhos Relacionadosunclassified
“…The work presented in [11] surveys the recent developed DDoS detection approaches using the machine learning models. Authors of [12,13,14] proposed a DDoS detection system using Naïve Bayes model.…”
Section: Related Workmentioning
confidence: 99%