Improving distributed denial of service attack detection using supervised machine learning
Tài liệu tham khảo
Kaur, 2016, Empirical analysis of Web attacks, Proc. Comput. Sci., 78, 298, 10.1016/j.procs.2016.02.057
Islam, 2017, A robust incremental clustering-based facial feature tracking, Appl. Soft Comput., 53, 34, 10.1016/j.asoc.2016.12.033
Jeya, 2012, Efficient classifier for r2l and u2r attacks, Int. J. Comput. Appl., 45, 28
Kang, 2012, Anomaly intrusion detection based on clustering a data stream, Int. J. Future Comput. Commun., 1, 17, 10.7763/IJFCC.2012.V1.5
Kim, 2017, A novel hybrid intrusion detection method integrating anomaly detection with misuse detection, Expert Syst. Appl., 41, 1690, 10.1016/j.eswa.2013.08.066
Ramasubramanian, 2017
Feng, 2014, Mining network data for intrusion detection through combining Svms with ant colony networks, Future Generat. Comput. Syst., 37, 127, 10.1016/j.future.2013.06.027
Muniyandi, 2012, Network anomaly detection by cascading k-means clustering and C4.5 decision tree algorithm, Procedia Eng., 30, 174, 10.1016/j.proeng.2012.01.849
Cheng, 2018, An abnormal network flow feature sequence prediction approach for DDoS attacks detection in the big data environment, Comput. Mater. Continua (CMC), 55, 95
Depren, 2005, An intelligent intrusion detection system (ids) for anomaly and misuse detection in computer networks, Expert Syst. Appl., 29, 713, 10.1016/j.eswa.2005.05.002
Qiu, 2020, Nei-TTE: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city, IEEE Trans. Ind. Inf., 16, 2659, 10.1109/TII.2019.2943906
Ajagekar, 2016, Study on web DDOS attacks detection using multinomial classifier
Kim, 2008
Calix, 2013, Feature ranking and support vector machines classification analysis of the NSL-KDD intrusion detection corpus
Panda, 2012, A hybrid intelligent approach for network intrusion detection, Procedia Eng., 30, 1, 10.1016/j.proeng.2012.01.827
Chen, 2007, Hybrid flexible neural tree-based intrusion detection systems, Int. J. Intell. Syst., 22, 337, 10.1002/int.20203
Luo, 2021, A novel web attack detection system for internet of things via ensemble classification, IEEE Trans. Ind. Inf., 17, 5810, 10.1109/TII.2020.3038761
Tian, 2020, Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles, IEEE Internet Things J., 7, 3901, 10.1109/JIOT.2019.2951620
Gaffney, 2001, Evaluation of intrusion detectors: a decision theory approach, 50
Huang, 2016, Clustering time-stamped data using multiple nonnegative matrices factorization, Knowl. Base Syst., 114, 88, 10.1016/j.knosys.2016.10.007
