2022
DOI: 10.4018/ijssci.309707
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Distributed Denial of Service (DDoS) Attacks Using Computational Intelligence and Majority Vote-Based Ensemble Approach

Abstract: The term “distributed denial of service” (DDoS) refers to one of the most common types of attacks. Sending a huge volume of data packets to the server machine is the target of a DDoS attack. This results in the majority of the consumption of network bandwidth and server, which ultimately leads to an issue with denial of service. In this paper, a majority vote-based ensemble of classifiers is utilized in the Sever technique, which results in improved accuracy and reduced computational overhead, when detecting a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Based on this, a hierarchical joint learning architecture was utilized to ensure the privacy of the learning process and organizational data, achieving a secure and privacy collaborative IoT NID. While these research methods all have superior performance in certain aspects, further improvement is still needed to meet the urgent needs of network security (Mishra et al, 2022). A new set of classifiers has been proposed to address the issue of significant network bandwidth and server losses caused by DDoS attacks.…”
Section: Fedl-based Nidmentioning
confidence: 99%
“…Based on this, a hierarchical joint learning architecture was utilized to ensure the privacy of the learning process and organizational data, achieving a secure and privacy collaborative IoT NID. While these research methods all have superior performance in certain aspects, further improvement is still needed to meet the urgent needs of network security (Mishra et al, 2022). A new set of classifiers has been proposed to address the issue of significant network bandwidth and server losses caused by DDoS attacks.…”
Section: Fedl-based Nidmentioning
confidence: 99%
“…13 A Distributed Denial of Service (DDoS) assault is a type of malicious attack against cloud systems that can create significant disruptions. 14 Several DDoS attacks are now conducted utilizing structured, remotely managed botnets. 12 The brute-force and semantic are the two types of DDoS assaults.…”
Section: Introductionmentioning
confidence: 99%
“…However, numerous DDoS assaults remain in the cloud platform variant in implementation strategy, scale, and aim 13 . A Distributed Denial of Service (DDoS) assault is a type of malicious attack against cloud systems that can create significant disruptions 14 . Several DDoS attacks are now conducted utilizing structured, remotely managed botnets 12 .…”
Section: Introductionmentioning
confidence: 99%
“…However, the inherent characteristics of WSNs, like limited resources, dynamic network topology, and lack of a centralized management infrastructure, make them vulnerable to a myriad of attacks. WSN attacks manifests in various forms, including Denial‐of‐Service (DoS), Distributed Denial of Service (DDoS), Root to Local (R2L), User to Root (U2R) attacks, 1–3 among others. These attacks compromise data integrity, confidentiality, and availability, posing significant challenges to the reliability and performance of WSNs 4,5 .…”
Section: Introductionmentioning
confidence: 99%