2020
DOI: 10.35877/454ri.asci2192
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Evaluation On Comparative Machine Learning Techniques For Detection of The Distributed Denial of Service (DDoS) Attacks

Abstract: The advent of the Internet that aided the efficient sharing of resources. Also, it has introduced adversaries whom are today restlessly in their continued efforts at an effective, non-detectable means to invade secure systems, either for fun or personal gains. They achieve these feats via the use of malware, which is both on the rise, wreaks havoc alongside causing loads of financial losses to users. With the upsurge to counter these escapades, users and businesses today seek means to detect these evol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
29
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(29 citation statements)
references
References 11 publications
0
29
0
Order By: Relevance
“…Distributed denial of service (DDoS) is usually a carefully crafted attack, initiated to target network resource(s). Targeted directly at compromised clients on a network [12,20,21], an adversary gains access of such compromised client, seizing up resources such CPU time, bandwidth, memory etc-to exploit a network's weakness. An adversary achieves this, by inserting malware that sought to overwhelm the network with requests [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Distributed denial of service (DDoS) is usually a carefully crafted attack, initiated to target network resource(s). Targeted directly at compromised clients on a network [12,20,21], an adversary gains access of such compromised client, seizing up resources such CPU time, bandwidth, memory etc-to exploit a network's weakness. An adversary achieves this, by inserting malware that sought to overwhelm the network with requests [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…Targeted directly at compromised clients on a network [12,20,21], an adversary gains access of such compromised client, seizing up resources such CPU time, bandwidth, memory etc-to exploit a network's weakness. An adversary achieves this, by inserting malware that sought to overwhelm the network with requests [20][21][22][23]. Since the DDoS is carefully crafted and well-coordinated, the magnitude depends on the botnet size-which corresponds also to the severity of the attack [19][20][21].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Spams are well-organized, carefully crafted and unsolicited messages sent to a network user without their consent, whose merchandise is unsolicited adverts aimed at making money. Its risen trend continues to pose concern to security experts the world over [7,8,9]. When spams are targeted at personal gains, it is simply fraud.…”
Section: Introductionmentioning
confidence: 99%