2020
DOI: 10.48550/arxiv.2006.13981
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

DDoSNet: A Deep-Learning Model for Detecting Network Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(16 citation statements)
references
References 0 publications
0
16
0
Order By: Relevance
“…First of all, the results are evaluations of the proposed dynamic and predictive model through SVM, decision tree, and KNN. We used a dataset based on DDoS attacks called CICDDoS2019 [ 26 ]. This dataset is based on real-time DDoS attacks, including DNS, MSSQL, NetBIOS, UDP, and TFTP.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…First of all, the results are evaluations of the proposed dynamic and predictive model through SVM, decision tree, and KNN. We used a dataset based on DDoS attacks called CICDDoS2019 [ 26 ]. This dataset is based on real-time DDoS attacks, including DNS, MSSQL, NetBIOS, UDP, and TFTP.…”
Section: Resultsmentioning
confidence: 99%
“…These networks use the resources and optimize the system operations. The main concept of these networks is to design a platform where users solve their complex problems in a synergic way through computers [ 26 ]. We proposed a self-organizing architecture by using smart devices and sensor nodes where the devices learn the environmental changes and user behavior.…”
Section: Proposed Data Analytics Model For 5g-based Iot Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…more challenges for researchers. Although DL-based models proposed recently Jia et al 18 and Elsayed et al 19 have shown better performance for detection of different types of DDoS attacks, such models require huge amount of resources. Therefore, here we aim to develop an ML-based model for the detection of malicious and benign flows which offer performance comparable to these state-of-the-art deep models.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…Moreover, the developed models offer a performance which is comparable to the state-of-the-art DL models. 18,19 In Table 7, we report a comparative analysis of the ML model developed by using CICIDS2017 dataset against stateof-the-art DL model. 20 The CICIDS2017 dataset includes records of various types of attacks which include brute force file transfer protocol (FTP), brute force secure shell (SSH), heartbleed, web attack, infiltration, botnet, DoS, and DDoS.…”
Section: Algorithmmentioning
confidence: 99%