2020
DOI: 10.1007/s11036-019-01506-1
|View full text |Cite
|
Sign up to set email alerts
|

MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…It uses a hybrid intrusion detection system (IDS) to detect IoT-DoS attacks, which detects suspicious network traffic from network nodes based on long short-term memory (LSTM). In [25], [26] the application of deep learning in the detection and mitigation of DDoS attacks on SDN controllers using models such as LSTM and convolutional neural network (CNN) is discussed. The models were implemented to detect transmission control protocol (TCP), user datagram protocol (UDP), and internet control message protocol (ICMP) flood attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…It uses a hybrid intrusion detection system (IDS) to detect IoT-DoS attacks, which detects suspicious network traffic from network nodes based on long short-term memory (LSTM). In [25], [26] the application of deep learning in the detection and mitigation of DDoS attacks on SDN controllers using models such as LSTM and convolutional neural network (CNN) is discussed. The models were implemented to detect transmission control protocol (TCP), user datagram protocol (UDP), and internet control message protocol (ICMP) flood attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…This method uses the Adaboost classification algorithm in the machine learning field to effectively identify LDDoS attack flow. Tang et al [23] proposed an LDDoS attack detection method based on multifeature fusion and Convolutional Neural Network (CNN) by calculating various network features and fusing them into feature maps. Siracusano et al [24] proposed an LDDoS attack detection method based on malicious TCP flow characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…The DDoS assault may appear as a bottleneck that is created by the bridge and blocks normal traffic at its desired location. In [22], researchers presented an algorithm to improve the efficiency and robustness of the low-rate DoS (DDoS) detection system by combining PSDentropy and Support Vector Machine (SVM). Entropy application efficiently reduces the number of calculations, while SVM supports the proposed method by organizing the dataset around its most pertinent characteristics.…”
Section: Related Workmentioning
confidence: 99%