2017 Tenth International Conference on Contemporary Computing (IC3) 2017
DOI: 10.1109/ic3.2017.8284360
|View full text |Cite
|
Sign up to set email alerts
|

The low-rate denial of service attack based comparative study of active queue management scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Furthermore, different active queue management techniques such as random early detection, deficit round-robin, fair queuing, drop-tail, stochastic fair queue, and random exponential marking can be employed for packet flow control between various source nodes and destination nodes. This can be achieved through the management of the intermediate routers' buffers [28].…”
Section: Average Queue Occupancymentioning
confidence: 99%
“…Furthermore, different active queue management techniques such as random early detection, deficit round-robin, fair queuing, drop-tail, stochastic fair queue, and random exponential marking can be employed for packet flow control between various source nodes and destination nodes. This can be achieved through the management of the intermediate routers' buffers [28].…”
Section: Average Queue Occupancymentioning
confidence: 99%
“…As the most representative AQM algorithm, RED [11] has been extended by many researchers [15][16][17][18][19][20][21]. Because RED manages the average queue size in a router and controls the queuing delay, it is applicable to and efficiently at not only lockout, global synchronization, full queue, and deadlock but also denial-of-service attacks [22]. RED has a higher throughput fairness than Tail-Drop [23,24].…”
Section: Introductionmentioning
confidence: 99%
“…After that, many machine learning techniques are explored for their outcomes analysis [5][6][7][8][9]. A novel machine learning-based model for content rating has been built by the researchers of [11] whereas the Internet traffic is examined in [12]. Secondly, Payload-based techniques were developed, during which packages of the related networks are analysed and protocols are recognised based on the study.…”
Section: Introductionmentioning
confidence: 99%