2015
DOI: 10.17485/ijst/2015/v8i26/83981
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DDoS Attack using Optimized Hop Count Filtering Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Peng et al 20 , Sindhu et al 21 , and Rai et al 22 have applied a decision tree based intrusion detection system to detect the attacks. Gwon et al 23 and Devi 24 proposed the LSTM model to detect the network attacks. Dhaliwal et al 25 , Pattawaro et al 26 , and Jiang 27 , deployed XGBoost for dimensionality reduction to reduce the irrelevant features for intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Peng et al 20 , Sindhu et al 21 , and Rai et al 22 have applied a decision tree based intrusion detection system to detect the attacks. Gwon et al 23 and Devi 24 proposed the LSTM model to detect the network attacks. Dhaliwal et al 25 , Pattawaro et al 26 , and Jiang 27 , deployed XGBoost for dimensionality reduction to reduce the irrelevant features for intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…The input layer for the classification consists of one timestep and the number features are set to 24. Thus input shape becomes (1,24). The hidden layer contains 20 memory units and the output layer is fully connected.…”
Section: Evaluation With Bi-lstmmentioning
confidence: 99%