2018 International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR) 2018
DOI: 10.1109/isamsr.2018.8540546
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Model for Detection and Prevention of DDoS and Flash Crowd Flooding Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
2

Relationship

3
5

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…• Software agent technique covers various roles in DDoS attack and defense methods. It provides various mechanisms of communication and decision-making to (1) compare current traffic with the normal traffic in realtime in order to control network traffic and mitigate DDoS attack as in [72], [73]; (2) defense against DDoS attack as in [74] and (3) make a distributed defensive scheme against DDoS attacks in the ISP domains as in [75].…”
Section: Analysis and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Software agent technique covers various roles in DDoS attack and defense methods. It provides various mechanisms of communication and decision-making to (1) compare current traffic with the normal traffic in realtime in order to control network traffic and mitigate DDoS attack as in [72], [73]; (2) defense against DDoS attack as in [74] and (3) make a distributed defensive scheme against DDoS attacks in the ISP domains as in [75].…”
Section: Analysis and Discussionmentioning
confidence: 99%
“…An agent is a software entity or a mixture of software and hardware entities that can be executed in parallel on behalf of its users. It includes many useful features, such as learning capability, cooperation, reactivity, and effectiveness [72].…”
Section: ) Software Agentmentioning
confidence: 99%
“…Irregular or random process of the RF has a low characteristic error, in contrast to some other classification algorithms [18]. There are many random forests to choose from and each of which produces various selected subtrees in the preparation part [19]. In IDS, RFs are classifiers used to organize and retrieve research information related to identity interference and intrusion.…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…e FC closely resembles the DDoS attack, whereby enormous legitimate clients simultaneously access a specific processing asset (e.g., a website). For instance, important news created worldwide, the distribution of the Olympic timetable, or organizations like Apple, Sony, and Samsung initiating a novel item brings about an unexpected flood in authentic traffic [10]. ese outcomes of the ill-timed and undue conveyance of reactions by the web administration require prompt action.…”
Section: Introductionmentioning
confidence: 99%