2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) 2016
DOI: 10.1109/icctict.2016.7514608
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(41 citation statements)
references
References 9 publications
0
31
0
1
Order By: Relevance
“…Table 3. Comparison of proposed system with existing works Works DR (%) FPR (%) Attack strategy * Liao Q et al [42] 99.80 0.33 3 Yadav S et al [43] 98.99 1.27 2 Wang J et al [29] 88.95 5.10 2 Liao et al [30] 89.25 0.04 4 Xie Y et al [9] 90.00 1.00 1 Our work 94.45 0.97 5 *Based on the taxonomy proposed in our previous work…”
Section: Discussionmentioning
confidence: 99%
“…Table 3. Comparison of proposed system with existing works Works DR (%) FPR (%) Attack strategy * Liao Q et al [42] 99.80 0.33 3 Yadav S et al [43] 98.99 1.27 2 Wang J et al [29] 88.95 5.10 2 Liao et al [30] 89.25 0.04 4 Xie Y et al [9] 90.00 1.00 1 Our work 94.45 0.97 5 *Based on the taxonomy proposed in our previous work…”
Section: Discussionmentioning
confidence: 99%
“…The proposed mechanism is compared with the Deep Learning Mechanism [10], Entropy based Clustering and Likehood Analyasis (ECLA) ) [12], Defence against Tilt DoS Attack (DAT) [9] and Document Popularity Scheme [4] and the results are presented in this section to show the performance of the proposed work. Fig.…”
Section: Experimental Results and Performance Evaluationmentioning
confidence: 99%
“…(10). scoredis = DH(p, q) /√2 (10) In general, the request inter-arrival time distribution observed for the incoming legitimate flow will not vary much from the ideal distribution and the score, if computed, will be 0 or close to 0. But, for the attack scenario, the deviation will be more (towards 1) which in turn indicates the suspicious level of the examined session.…”
Section: Computing Score With Respect To the Request Inter-arrival Timementioning
confidence: 99%
See 2 more Smart Citations