2017 10th International Conference on Intelligent Computation Technology and Automation (ICICTA) 2017
DOI: 10.1109/icicta.2017.43
|View full text |Cite
|
Sign up to set email alerts
|

Research on DDoS Attacks Detection Based on RDF-SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 3 publications
0
10
0
Order By: Relevance
“…In a Client and server model various cryptographic technique are used to impart security and manage confidentiality, integrity, nonrepudiation and authentication [16].Here we have simulated a communication between nodes in a simulator. We have set up in total of six nodes of which node 3 and 6 are receiver nodes and node 2, 4 and 5 are used to transmit data.…”
Section: Offline Simulation and Results And Securitymentioning
confidence: 99%
“…In a Client and server model various cryptographic technique are used to impart security and manage confidentiality, integrity, nonrepudiation and authentication [16].Here we have simulated a communication between nodes in a simulator. We have set up in total of six nodes of which node 3 and 6 are receiver nodes and node 2, 4 and 5 are used to transmit data.…”
Section: Offline Simulation and Results And Securitymentioning
confidence: 99%
“…The successful method of intrusion detection will reduce the system's false positive rate and increase the accuracy of the classification. Therefore, several SVM-based methods of intrusion detection have been proposed [78][79][80][81][82][83][84].…”
Section: Applications Of Support Vector Machine (Svm)mentioning
confidence: 99%
“…How to successfully track and prevent network interference has been a critical problem in the field of data security. Therefore, many experiments have been carried out to accomplish this goal utilizing machine learning techniques [78][79][80][81][82][83][84]. If the successful intrusion detection device is able to reduce the false-positive rate of the system and increase the classification accuracy.…”
Section: E Literature-based Intrusion Detection Techniquesmentioning
confidence: 99%
“…Various ML technologies have been employed, mainly as classifiers, in the detection of DDoS attacks. There are Support Vector Machine (SVM) [4], k-Nearest Neighbors (KNN) [5], Naïve Bayes Classifier [6], Random Forest (RF) [7], Density-Based Spatial Clustering of Applications with Noise (DBSCAN) [8], and Artificial Neural Network (ANN) [17], to name a few. With SVM, based on labeled training data, a hyperplane is constructed in the transform domain to classify unseen data.…”
Section: And DL For Ddos Detectionmentioning
confidence: 99%