2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI) 2018
DOI: 10.1109/icoei.2018.8553848
|View full text |Cite
|
Sign up to set email alerts
|

Automated Approach for DDOS Attacks Detection Based on Naive Bayes Multinomial Classifier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The first approach consists in the separate use of some machine learning algorithms to detect the RoQ attacks, namely Multi-layer Perceptron (MLP) neural network with backpropagation, K-Nearest Neighbors (K-NN), Support Vector Machine (SVM) and Multinomial Naive Bayes (MNB). These four algorithms have been widely investigated for detecting high-rate DDoS attacks, e, g. MLP used in [57][58][59], K-NN used in [57,59,60], SVM used in [58][59][60][61] and MNB used in [62][63][64]. The second approach consists in the joint use of a combination of three distinct methods: Fuzzy Loggic (FL), MLP and the Euclidean Distance (ED).…”
Section: Introductionmentioning
confidence: 99%
“…The first approach consists in the separate use of some machine learning algorithms to detect the RoQ attacks, namely Multi-layer Perceptron (MLP) neural network with backpropagation, K-Nearest Neighbors (K-NN), Support Vector Machine (SVM) and Multinomial Naive Bayes (MNB). These four algorithms have been widely investigated for detecting high-rate DDoS attacks, e, g. MLP used in [57][58][59], K-NN used in [57,59,60], SVM used in [58][59][60][61] and MNB used in [62][63][64]. The second approach consists in the joint use of a combination of three distinct methods: Fuzzy Loggic (FL), MLP and the Euclidean Distance (ED).…”
Section: Introductionmentioning
confidence: 99%
“…is method improves the efficiency of bug classification by reducing the dimensions of the terms [17]. Some researchers have proposed automatic bug-dispatching techniques, such as support-vector machine (SVM) [18], k-nearest neighbor algorithm (KNN) [19], and naive Bayes multinomial (NBM) [20], to ensure that bug reports are assigned to the appropriate developers to improve the accuracy of bug allocation. Xia et al used different combinations of imbalanced learning strategies and text classification algorithms to identify high-impact bug reports.…”
Section: Introductionmentioning
confidence: 99%