2014
DOI: 10.9790/0661-1634119125
|View full text |Cite
|
Sign up to set email alerts
|

Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…The better training algorithm was determined, enabling a DDoS attack to be identified by using the KDD dataset [29].…”
Section: Final Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The better training algorithm was determined, enabling a DDoS attack to be identified by using the KDD dataset [29].…”
Section: Final Resultsmentioning
confidence: 99%
“…A wide range of recognized patterns and ML algorithms were used to develop the KDD1999 dataset, which was launched for the KDD Cup competition in 1999. The standard KDD1999 database, which contains connecting records of attacks and interference in a network, was used for testing and training [29].…”
Section: Collecting the Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…Implementation of the confusion matrix that measures detection performance is the best option as this matrix has a wide range of measurement of detection. e matrix has also been utilised by many researchers [38][39][40][41][42][43][44][45].…”
Section: Critical Analysismentioning
confidence: 99%