2015
DOI: 10.1109/tc.2014.2375218
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques

Abstract: the ensemble detection system involves time-consuming computation and cannot work real-time. Yu et al. [21] suggested a two-tier hierarchical detection system using SVM. The hierarchical structure and one-class SVM (i.e., Support Vector Data Description) equip it with the advantage in classifying various attacks into their appropriate classes. This detection system achieved its best attack detection rate of 99.40% using 3 selected Management Information Based (MIB) features. Statistical analysis techniques hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
69
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 142 publications
(69 citation statements)
references
References 42 publications
0
69
0
Order By: Relevance
“…Therefore on utilize the accessible resources; customers have to be compelled to modification, which they have to be compelled to act lots of "smart". They have to vary from being passive customers to being active customers [1]. Sensible grids aim to reduce the energy consumption, guarantee dependableness of power give, reduce carbon foot print, and minimize the costs associated with power consumption.…”
Section: Literature Surveymentioning
confidence: 99%
See 3 more Smart Citations
“…Therefore on utilize the accessible resources; customers have to be compelled to modification, which they have to be compelled to act lots of "smart". They have to vary from being passive customers to being active customers [1]. Sensible grids aim to reduce the energy consumption, guarantee dependableness of power give, reduce carbon foot print, and minimize the costs associated with power consumption.…”
Section: Literature Surveymentioning
confidence: 99%
“…until recently it had been assumed that the techniques accustomed notice and establish unhealthy detector activities in state estimation can also thwart malicious detector activity modification. However, recent work by Liu et al [1] incontestable that Associate in Nursing soul, armed with the knowledge of network configuration, can inject false data into state estimation that uses DC power flow models whereas not being detected. throughout this work, we tend to tend to explore the detection of false data injection attacks of [1] by protecting a strategically elite set of detector lineaments and by having the best thanks to severally verify or live the values of a strategically elite set of state variables.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…The principle of anomaly detection is that we only need to learn a profile of normal traffic whereas the outliers are considered as attacks. Statistical learning [31], [32], [32]- [34] and unsupervised learning [35]- [37] are currently primary techniques used for anomaly detection. The anomaly detection for network intrusion detection is not very suitable and practical for the reasons below:…”
Section: Introductionmentioning
confidence: 99%