2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2018
DOI: 10.1109/icccnt.2018.8494130
|View full text |Cite
|
Sign up to set email alerts
|

Protocol Specific Multi-Threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…A protocol-based network intrusion detection system was designed by Patil et al (2018) to detect DoS/DDoS attacks in networks. In this system, Incoming packets were distributed according to the protocol and queued for additional processing.…”
Section: Related Workmentioning
confidence: 99%
“…A protocol-based network intrusion detection system was designed by Patil et al (2018) to detect DoS/DDoS attacks in networks. In this system, Incoming packets were distributed according to the protocol and queued for additional processing.…”
Section: Related Workmentioning
confidence: 99%
“…Sunny Behal et al proposed an Internet service provider (ISP) level distributed and flexible defense system [ 16 ]. Patil, R. et al designed a Protocol Specific Multi-Threaded Network Intrusion Detection System (PM-NIDS), where the incoming packets are queued, extracted, and classified [ 17 ]. Chenxu Wang et al proposed a defense system of detecting and mitigating application layer DDoS attacks, mainly by filtering mechanisms, including a whitelist and a blacklist [ 18 ].…”
Section: Related Workmentioning
confidence: 99%
“…The availability of the training and the testing dataset results in attack patterns to generate the optimal features [12]. Patil et al [13] developed a multithreaded based intrusion detection system to extract the accurate features in the cloud system.…”
Section: Related Workmentioning
confidence: 99%
“…The output obtained from the RBM 1 hidden layer is passed as input to the second RBM, and the output obtained from RBM layer 2 is fed as input to the MLP layer. The feature vector is the input to the visible layer of RBM1, and the output from the hidden layer of the RBM 1 is expressed as equation ( 12) and (13).…”
Section: Deep Belief Network For Attack Detectionmentioning
confidence: 99%