2023
DOI: 10.1016/j.cose.2023.103117
|View full text |Cite
|
Sign up to set email alerts
|

Detecting DDoS attacks using adversarial neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…The third layer ensures that all user database passwords are hashed and stored using Secure Hash Algorithm (SHA)-256 and SHA-512. For data in transit, to prevent distributed denial-of-service attacks, we use the Cloudflare-distributed denial-of-service mitigation service to ensure masking of website internet protocol address [ 69 , 70 ]. A distributed denial-of-service attack is a deliberate attempt to stymie a server, service, or network’s regular activity by saturating the target or its surrounding infrastructure with a deluge of internet traffic.…”
Section: Discussionmentioning
confidence: 99%
“…The third layer ensures that all user database passwords are hashed and stored using Secure Hash Algorithm (SHA)-256 and SHA-512. For data in transit, to prevent distributed denial-of-service attacks, we use the Cloudflare-distributed denial-of-service mitigation service to ensure masking of website internet protocol address [ 69 , 70 ]. A distributed denial-of-service attack is a deliberate attempt to stymie a server, service, or network’s regular activity by saturating the target or its surrounding infrastructure with a deluge of internet traffic.…”
Section: Discussionmentioning
confidence: 99%
“…The system is aimed at being deployed for monitoring malicious attacks on the system's infrastructure. This system is designed to prevent various threats such as DDoS [29,30]MiTM attacks [31], SQL injections [12,32], phishing [33,34] and malware [35] and requires training corresponding ML models built on high-quality datasets. The scheme of threat detection with ML models in server and network infrastructure is shown in Figure 3.…”
Section: Methodsmentioning
confidence: 99%
“…In this approach, the attacker exploits node-level attributes. I. Debicha et al 17 and A. Mustapha et al 18 use network characteristics and the GAN model, respectively, to generate ADA traffic. It can evade detection while continuing to carry out its planned malevolent functions.…”
Section: Related Workmentioning
confidence: 99%