2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicat 2019
DOI: 10.1109/idaacs.2019.8924406
|View full text |Cite
|
Sign up to set email alerts
|

Classification Methods of Machine Learning to Detect DDoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…[20], the ANN demonstrated the highest accuracy compared to the other two methods for the generated dataset. Radivilova et al [21] utilized the SNMP-MIB Dataset to investigate various types of attacks, including TCP SYN, UDP flood, ICMPECHO, HTTP flood, Slowpost, Slowloris, and SSH brute force. The study involved analyzing primary approaches for detecting DDoS attacks through the realization of network traffic.…”
Section: A Machine Learning Approachesmentioning
confidence: 99%
“…[20], the ANN demonstrated the highest accuracy compared to the other two methods for the generated dataset. Radivilova et al [21] utilized the SNMP-MIB Dataset to investigate various types of attacks, including TCP SYN, UDP flood, ICMPECHO, HTTP flood, Slowpost, Slowloris, and SSH brute force. The study involved analyzing primary approaches for detecting DDoS attacks through the realization of network traffic.…”
Section: A Machine Learning Approachesmentioning
confidence: 99%
“…One of the techniques is the Decision Tree, which is susceptible to overfitting, susceptible to noise in the dataset, and unsuitable for large datasets [23]. An experiment has been conducted in which brute force attacks are identified using a model based on processing the network log to obtain information by reading certain alerts in the network log, such as "SSH user failed to login from IP," to determine that the IP is executing a brute force attack [12]. Another experiment classifies the brute-force attack using deep learning.…”
Section: Related Studiesmentioning
confidence: 99%
“…The application of fractal analysis to detect attacks can be found in [18]. The authors in [19] dealt with a combination of fractal and recurrent functions. Different machine learning (ML) algorithms were used by [20].…”
Section: Related Workmentioning
confidence: 99%