2020
DOI: 10.1016/j.micpro.2020.103279
|View full text |Cite
|
Sign up to set email alerts
|

Securing VPN from insider and outsider bandwidth flooding attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…Furthermore, the deep networks can classify the intrusion type thus, it can be useful for detecting unknown attacks in the network. The node with an Internet protocol (IP) address and Internet produces network traffic that blocks the service to users [76]. However, the ML based methods are applicable in ad-click prognosis systems, and a two-way authentication system provides a secure connection between digital environments [77,78].…”
Section: Deep Learning (Dl) and Machine Learning Based Nidsmentioning
confidence: 99%
“…Furthermore, the deep networks can classify the intrusion type thus, it can be useful for detecting unknown attacks in the network. The node with an Internet protocol (IP) address and Internet produces network traffic that blocks the service to users [76]. However, the ML based methods are applicable in ad-click prognosis systems, and a two-way authentication system provides a secure connection between digital environments [77,78].…”
Section: Deep Learning (Dl) and Machine Learning Based Nidsmentioning
confidence: 99%