2018
DOI: 10.1007/978-981-10-8276-4_35
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Defense Algorithms of Different Types of DDoS Attacks Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…False positive rates were compared with the Packet Threshold Algorithm-Support Vector Machine (PTA-SVM) model proposed by [18], Efficient Data Adapted Decision Tree (EDADT) proposed by [19], Lightweight detection algorithm proposed by [20], Modified K-means proposed by [21], and a logistic regression model proposed by [22]. The false positive rate for the proposed model was 0, outperforming the algorithms it was compared with, as shown in Figure 19.…”
Section: Test Results and Discussionmentioning
confidence: 99%
“…False positive rates were compared with the Packet Threshold Algorithm-Support Vector Machine (PTA-SVM) model proposed by [18], Efficient Data Adapted Decision Tree (EDADT) proposed by [19], Lightweight detection algorithm proposed by [20], Modified K-means proposed by [21], and a logistic regression model proposed by [22]. The false positive rate for the proposed model was 0, outperforming the algorithms it was compared with, as shown in Figure 19.…”
Section: Test Results and Discussionmentioning
confidence: 99%
“…Data cannot be exchange without networks; therefore, networking plays an important role in any field related to www.ijacsa.thesai.org information technology. That is why there are vicarious network attacks such as mentioned by [20], [21], [22] , and [23].…”
Section: A Network Typementioning
confidence: 99%
“…Attacks on the TCP/IP layer cripple online servers and have a cap on the number of requests that can be made per second. This category includes DDoS attacks, Slowloris, and zero-day attacks that exploit Apache or Windows flaws ( Yusof, Ali & Darus, 2018 ). The strategies proposed to understand DDoS assaults at the TCP/IP layer are merely a part of DDoS occurrences at the application layer.…”
Section: Introductionmentioning
confidence: 99%