Journal articles on the topic 'DDoS attack detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'DDoS attack detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Aladaileh, Mohammad Adnan, Mohammed Anbar, Ahmed J. Hintaw, et al. "Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis." Applied Sciences 13, no. 2 (2023): 775. http://dx.doi.org/10.3390/app13020775.
Full textHan, Dezhi, Kun Bi, Han Liu, and Jianxin Jia. "A DDoS attack detection system based on spark framework." Computer Science and Information Systems 14, no. 3 (2017): 769–88. http://dx.doi.org/10.2298/csis161217028h.
Full textDasari, Kishore Babu, and Nagaraju Devarakonda. "Detection of Different DDoS Attacks Using Machine Learning Classification Algorithms." Ingénierie des systèmes d information 26, no. 5 (2021): 461–68. http://dx.doi.org/10.18280/isi.260505.
Full textBeshah, Yonas Kibret, Surafel Lemma Abebe, and Henock Mulugeta Melaku. "Drift Adaptive Online DDoS Attack Detection Framework for IoT System." Electronics 13, no. 6 (2024): 1004. http://dx.doi.org/10.3390/electronics13061004.
Full textLi, Feng, and Hai Ying Wang. "Design on DDoS Attack Detection and Prevention Systems." Applied Mechanics and Materials 530-531 (February 2014): 798–801. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.798.
Full textXu, Hao, and Hequn Xian. "SCD: A Detection System for DDoS Attacks based on SAE-CNN Networks." Frontiers in Computing and Intelligent Systems 5, no. 3 (2023): 94–99. http://dx.doi.org/10.54097/fcis.v5i3.13865.
Full textD., Glăvan. "DDoS detection and prevention based on artificial intelligence techniques." Scientific Bulletin of Naval Academy XXII, no. 1 (2019): 134–43. http://dx.doi.org/10.21279/1454-864x-19-i1-018.
Full textZhang, Jian, Qidi Liang, Rui Jiang, and Xi Li. "A Feature Analysis Based Identifying Scheme Using GBDT for DDoS with Multiple Attack Vectors." Applied Sciences 9, no. 21 (2019): 4633. http://dx.doi.org/10.3390/app9214633.
Full textXie, Bailin, Yu Wang, Guogui Wen, and Xiaojun Xu. "Application-Layer DDoS Attack Detection Using Explicit Duration Recurrent Network-Based Application-Layer Protocol Communication Models." International Journal of Intelligent Systems 2023 (June 17, 2023): 1–13. http://dx.doi.org/10.1155/2023/2632678.
Full textGoparaju, Bhargavi, and Dr Bandla Srinivasa Rao. "A DDoS Attack Detection using PCA Dimensionality Reduction and Support Vector Machine." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1s (2023): 01–08. http://dx.doi.org/10.17762/ijcnis.v14i1s.5586.
Full textSudhanva, Manjunath, Abhay Pratap Singh Athreya, Chandra Gowda Naveen, T. Yerriswamy, and H. N. Veena. "Machine Learning Techniques to Detect DDoS Attacks in IoT's, SDN's: A Comprehensive Overview." International Journal of Human Computations and Intelligence 2, no. 4 (2023): 203–11. https://doi.org/10.5281/zenodo.8027034.
Full textZeinalpour, Alireza, and Hassan A. Ahmed. "Addressing the Effectiveness of DDoS-Attack Detection Methods Based on the Clustering Method Using an Ensemble Method." Electronics 11, no. 17 (2022): 2736. http://dx.doi.org/10.3390/electronics11172736.
Full textKatuk, Norliza, Mohamad Sabri Sinal, Mohammed Gamal Ahmed Al-Samman, and Ijaz Ahmad. "An observational mechanism for detection of distributed denial-of-service attacks." International Journal of Advances in Applied Sciences 12, no. 2 (2023): 121. http://dx.doi.org/10.11591/ijaas.v12.i2.pp121-132.
Full textNorliza, Katuk, Gamal Ahmed Al-Samman Mohammed, and Ahmad Ijaz. "An observational mechanism for detection of distributed denial-of-service attacks." International Journal of Advances in Applied Sciences (IJAAS) 12, no. 2 (2023): 132. https://doi.org/10.11591/ijaas.v12.i2.pp121-132.
Full textKasture, Pradnya. "DDoS Attack Detection using ML." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6421–24. http://dx.doi.org/10.22214/ijraset.2023.53133.
Full textAineyoona, Patrick. "A MACHINE LEARNING ALGORITHM WITH SELF-UPDATE PARAMETER CALIBRATION TO IMPROVE INTRUSION DETECTION OF DDOS IN COMMUNICATION NETWORKS." International Journal of Engineering Applied Sciences and Technology 6, no. 6 (2021): 72–79. http://dx.doi.org/10.33564/ijeast.2021.v06i06.008.
Full textAmrish, R., K. Bavapriyan, V. Gopinaath, A. Jawahar, and C. Vinoth Kumar. "DDoS Detection using Machine Learning Techniques." March 2022 4, no. 1 (2022): 24–32. http://dx.doi.org/10.36548/jismac.2022.1.003.
Full textChen, Hongsong, Caixia Meng, and Jingjiu Chen. "DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment." International Journal of Information Security and Privacy 15, no. 3 (2021): 1–18. http://dx.doi.org/10.4018/ijisp.2021070101.
Full textReddy, N. Narasimha, and G. M. Vema Reddy. "DDoS Attack Detection in SDN using ML Techniques." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (2023): 2035–38. http://dx.doi.org/10.22214/ijraset.2023.56350.
Full textRudro, Rifat Al Mamun, MD FARUK ABDULLAH AL SOHAN, Syma Kamal Chaity, and Rubina Islam Reya. "Enhancing DDoS Attack Detection Using Machine Learning: A Framework with Feature Selection and Comparative Analysis of Algorithms." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 14, no. 03 (2023): 1185–92. http://dx.doi.org/10.61841/turcomat.v14i03.14086.
Full textKumavat, Kavita S., and Joanne Gomes. "Common Mechanism for Detecting Multiple DDoS Attacks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 81–90. http://dx.doi.org/10.17762/ijritcc.v11i4.6390.
Full textMa, Zheng, Rui Zhang, and Lang Gao. "Detection Model for 5G Core PFCP DDoS Attacks Based on Sin-Cos-bIAVOA." Algorithms 18, no. 7 (2025): 449. https://doi.org/10.3390/a18070449.
Full textXiong, Ze Yu. "Traffic Classification Features and its Application in DDoS Detection." Applied Mechanics and Materials 380-384 (August 2013): 2673–76. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2673.
Full textHaseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, et al. "High-Speed Network DDoS Attack Detection: A Survey." Sensors 23, no. 15 (2023): 6850. http://dx.doi.org/10.3390/s23156850.
Full textLe, Duc, Minh Dao, and Quyen Nguyen. "Comparison of machine learning algorithms for DDoS attack detection in SDN." Information and Control Systems, no. 3 (June 15, 2020): 59–70. http://dx.doi.org/10.31799/1684-8853-2020-3-59-70.
Full textSravan Kumar G, Et al. "The Investigative Study on the Performance Analysis of SMOTE employed Machine Learning Classifier Models to DDoS Attack Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 702–8. http://dx.doi.org/10.17762/ijritcc.v11i9.8862.
Full textFatkieva, R. R., A. S. Sudakov, and A. S. Nersisyan. "Key Characteristics of Network Traffic to Identify DDoS Attacks." LETI Transactions on Electrical Engineering & Computer Science 17, no. 8 (2024): 65–80. http://dx.doi.org/10.32603/2071-8985-2024-17-8-65-80.
Full textManish Kumar Rajak and Dr. Ravindra Tiwari. "A Framework for Detecting Distributed Denial of Services Attack in Cloud Enviorment using Machine Learning Techniques." Journal of Advances and Scholarly Researches in Allied Education 21, no. 1 (2024): 175–79. http://dx.doi.org/10.29070/hc5qzn85.
Full textRajak, Manish Kumar, and Ravindra Tiwari. "Framework for Detecting Distributed Denial of Services Attack in Cloud Environment." International Journal of Innovative Research in Computer and Communication Engineering 12, Special Is (2024): 43–48. http://dx.doi.org/10.15680/ijircce.2024.1203507.
Full textAsmaa A. Alhussain. "DDoS Detection by Using Machine Learning." Journal of Information Systems Engineering and Management 10, no. 54s (2025): 142–51. https://doi.org/10.52783/jisem.v10i54s.11045.
Full textHsieh, Chih-Hsiang, Wei-Kuan Wang, Cheng-Xun Wang, Shi-Chun Tsai, and Yi-Bing Lin. "Efficient Detection of Link-Flooding Attacks with Deep Learning." Sustainability 13, no. 22 (2021): 12514. http://dx.doi.org/10.3390/su132212514.
Full textLysenko, Sergii, Kira Bobrovnikova, Serhii Matiukh, Ivan Hurman, and Oleg Savenko. "Detection of the botnets’ low-rate DDoS attacks based on self-similarity." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (2020): 3651. http://dx.doi.org/10.11591/ijece.v10i4.pp3651-3659.
Full textThapanarath, Khempetch, and Wuttidittachotti Pongpisit. "DDoS attack detection using deep learning." International Journal of Artificial Intelligence (IJ-AI) 10, no. 2 (2021): 382–88. https://doi.org/10.11591/ijai.v10.i2.pp382-388.
Full textNashat, Dalia, Fatma A. Hussain, and Xiaohong Jiang. "Detection of Distributed Denial of Service Flooding Attack Using Odds Ratio." Journal of Networking and Network Applications 1, no. 2 (2021): 67–74. http://dx.doi.org/10.33969/j-nana.2021.010204.
Full textTay, Wei-Wu, Siew-Chin Chong, and Lee-Ying Chong. "DDoS Attack Detection with Machine Learning." Journal of Informatics and Web Engineering 3, no. 3 (2024): 190–207. http://dx.doi.org/10.33093/jiwe.2024.3.3.12.
Full textT. Ramya. "Review on DDOS Attacks in IOT Networks." Power System Technology 48, no. 4 (2024): 2400–2428. https://doi.org/10.52783/pst.1137.
Full textCheng, Jieren, Chen Zhang, Xiangyan Tang, Victor S. Sheng, Zhe Dong, and Junqi Li. "Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning." Security and Communication Networks 2018 (October 16, 2018): 1–19. http://dx.doi.org/10.1155/2018/5198685.
Full textKumar, Aman. "Distributed Denial of Service (DDoS) Attack Mitigation using AI." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 5706–14. https://doi.org/10.22214/ijraset.2025.69632.
Full textHan, Biao, Xiangrui Yang, Zhigang Sun, Jinfeng Huang, and Jinshu Su. "OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN." Security and Communication Networks 2018 (2018): 1–15. http://dx.doi.org/10.1155/2018/9649643.
Full textHarrsheeta, Sasikumar. "DDoS Attack Detection and Classification using Machine Learning Models with Real-Time Dataset Created." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 5 (2021): 145–53. https://doi.org/10.35940/ijrte.E5217.019521.
Full textSergii, Lysenko, Bobrovnikova Kira, Matiukh Serhii, Hurman Ivan, and Savenko Oleh. "Detection of the botnets' low-rate DDoS attacks based on self-similarity." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (2020): 3651–59. https://doi.org/10.11591/ijece.v10i4.pp3651-3659.
Full textAbdurohman, Maman, Dani Prasetiawan, and Fazmah Arif Yulianto. "Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN)." ComTech: Computer, Mathematics and Engineering Applications 8, no. 4 (2017): 215. http://dx.doi.org/10.21512/comtech.v8i4.3902.
Full textKareem, Morenikeji Kabirat, Olaniyi Dada Aborisade, Saidat Adebukola Onashoga, Tole Sutikno, and Olaniyi Mathew Olayiwola. "Efficient model for detecting application layer distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 1 (2023): 441–50. http://dx.doi.org/10.11591/eei.v12i1.3871.
Full textShieh, Chin-Shiuh, Thanh-Tuan Nguyen, Wan-Wei Lin, Wei Kuang Lai, Mong-Fong Horng, and Denis Miu. "Detection of Adversarial DDoS Attacks Using Symmetric Defense Generative Adversarial Networks." Electronics 11, no. 13 (2022): 1977. http://dx.doi.org/10.3390/electronics11131977.
Full textAladaileh, Mohammad A., Mohammed Anbar, Iznan H. Hasbullah, and Yousef K. Sanjalawe. "Information Theory-based Approaches to Detect DDoS Attacks on Software-defined Networking Controller a Review." International Journal of Education and Information Technologies 15 (April 22, 2021): 83–94. http://dx.doi.org/10.46300/9109.2021.15.9.
Full textWang, Jin, Liping Wang, and Ruiqing Wang. "MFFLR-DDoS: An encrypted LR-DDoS attack detection method based on multi-granularity feature fusions in SDN." Mathematical Biosciences and Engineering 21, no. 3 (2024): 4187–209. http://dx.doi.org/10.3934/mbe.2024185.
Full textAlzahrani, Ahmed Saeed. "An Efficient DDoS Attack Detecting System using Levenberg-Marquardt Based Deep Artificial Neural Network Approach for IOT." International Journal of Innovative Technology and Exploring Engineering 10, no. 3 (2021): 59–66. http://dx.doi.org/10.35940/ijitee.c8356.0110321.
Full textAhmed, Saeed Alzahrani. "An Efficient DDoS Attack Detecting System using Levenberg-Marquardt Based Deep Artificial Neural Network Approach for IOT." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 3 (2021): 59–66. https://doi.org/10.35940/ijitee.C8356.0110321.
Full textH K, Pradeep, Pavan Kumar, ,. Pradeepa A J, Prashantha S, and Saad Faisal Khan. "Detection Of DDOS Attack Using Machine Learning." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40595.
Full textSukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, and Muhammad Nur Faiz. "A Classification Data Packets Using the Threshold Method for Detection of DDoS." Journal of Innovation Information Technology and Application (JINITA) 6, no. 1 (2024): 28–36. http://dx.doi.org/10.35970/jinita.v6i1.2224.
Full text