2013
DOI: 10.1016/j.comcom.2012.09.010
|View full text |Cite
|
Sign up to set email alerts
|

Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(18 citation statements)
references
References 47 publications
0
18
0
Order By: Relevance
“…The results acquired from the proposed approach have demonstrated the importance and strength of the model to achieve the objectives deliberated for the solution. To detect the DDoS attack, the researchers introduced many detector schemes such as RBF-NN [27], adaptive and hybrid neuro-fuzzy systems [17], distributed state estimation methods based on ADMM [28], adaptive hybrid IDS [19].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The results acquired from the proposed approach have demonstrated the importance and strength of the model to achieve the objectives deliberated for the solution. To detect the DDoS attack, the researchers introduced many detector schemes such as RBF-NN [27], adaptive and hybrid neuro-fuzzy systems [17], distributed state estimation methods based on ADMM [28], adaptive hybrid IDS [19].…”
Section: Related Workmentioning
confidence: 99%
“…With the intention of reducing computational costs and improving IDS classification performance, several machine learning techniques with Chi-square (CHI), Information gain (IG) [16] and Correlation-based Feature Selection (CFS) such as filter techniques [17] are used in this study. The filter technique based on the ranking approach sorts the features according to their usefulness in the classification movement.…”
Section: Introductionmentioning
confidence: 99%
“…The work in [26] detect DDoS attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Multiple features from TCP flows are extracted and utilized in detection, assuming no payload inspection, showing a high detection rate.…”
Section: Related Workmentioning
confidence: 99%
“…Recent studies [4,5,6,7,8,9,10,11,12,13] proposed some methods to filter malicious packets and verify intruder attempts by monitoring the impact of user behavior on the service level agreement, the network attacks are more towards a specific computer than the entire network. Therefore, we need to monitor some computers whose conservation is given priority status.…”
Section: Introductionmentioning
confidence: 99%