2021
DOI: 10.1007/s10922-020-09578-1
|View full text |Cite
|
Sign up to set email alerts
|

ML-Based DDoS Detection and Identification Using Native Cloud Telemetry Macroscopic Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 24 publications
0
10
0
1
Order By: Relevance
“…There is a choice for the value of squared error loss L (i) for regression L can be formulated as in Equation ( 17) and (ii) for classification L in Equation (18). 17)…”
Section: Random Forestmentioning
confidence: 99%
See 1 more Smart Citation
“…There is a choice for the value of squared error loss L (i) for regression L can be formulated as in Equation ( 17) and (ii) for classification L in Equation (18). 17)…”
Section: Random Forestmentioning
confidence: 99%
“…On the other side, semantic assaults also known as vulnerability assaults exhaust the cloud server's network bandwidth by weakening the use of protocols. 18 The attacker targets a particular protocol by producing a least low volume of malicious traffic. This type of attack is termed a low-rate DDoS attack like legitimate traffic.…”
Section: Introductionmentioning
confidence: 99%
“…Signature-based IDS and anomaly-based IDS have two major drawbacks. The first is when the IDS detects a weakness starting with the SYN protocol, for example SYN-Flood, because the SYN protocol is a legal and absolute protocol used to initiate communication between two computers/devices in a network [13]. Therefore, it is difficult for ordinary IDS to generate an alert against attacks initiated with SYN protocol artifacts [14].…”
Section: En-176mentioning
confidence: 99%
“…Several studies proposed to use Support Vector Machine (SVM) classifiers, such as [6][7][8][9][10], and [11]. artificial neural networks, such as [12,13] and [14], and other ML algorithms, as in [15][16][17][18][19], and [20]. Interestingly, reinforcement learning has been also adopted to perform DDoS mitigation in paper [21].…”
Section: Related Workmentioning
confidence: 99%