咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 7 篇 计算机科学与技术...
    • 4 篇 网络空间安全
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 信息与通信工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 仪器科学与技术
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
  • 5 篇 法学
    • 5 篇 法学
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 11 篇 distributed deni...
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 attack detection
  • 2 篇 intrusion detect...
  • 2 篇 machine learning
  • 2 篇 web server
  • 1 篇 entropy algorith...
  • 1 篇 hop-count filter...
  • 1 篇 deep learning
  • 1 篇 ddos attack
  • 1 篇 rényi joint entr...
  • 1 篇 long short-term ...
  • 1 篇 saudi arabia ixp...
  • 1 篇 controller
  • 1 篇 software-defined...
  • 1 篇 software-defined...
  • 1 篇 chi-square
  • 1 篇 ip packets filte...
  • 1 篇 smart contract

机构

  • 2 篇 national advance...
  • 1 篇 computer science...
  • 1 篇 applied college ...
  • 1 篇 school of techno...
  • 1 篇 dean engineering...
  • 1 篇 department of co...
  • 1 篇 cybersecurity de...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 national advance...
  • 1 篇 cybersecurity de...
  • 1 篇 remote sensing n...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 school of electr...
  • 1 篇 institute of sci...
  • 1 篇 higher colleges ...
  • 1 篇 department of co...
  • 1 篇 computer science...

作者

  • 3 篇 mohammed anbar
  • 2 篇 mohammad adnan a...
  • 2 篇 iznan h.hasbulla...
  • 1 篇 ding zhiyi
  • 1 篇 shao zhiqing
  • 1 篇 zhuohao wang
  • 1 篇 shadi al-sarawi
  • 1 篇 runhu wang
  • 1 篇 turke althobaiti
  • 1 篇 yung-wey chong
  • 1 篇 ying liu
  • 1 篇 chengxiao yu
  • 1 篇 yichiet aun
  • 1 篇 basim ahmad alab...
  • 1 篇 anitha thangasam...
  • 1 篇 muhammad waqas n...
  • 1 篇 shaza dawood ahm...
  • 1 篇 bose sundan
  • 1 篇 diane r.murphy
  • 1 篇 chenyang xu

语言

  • 11 篇 英文
检索条件"主题词=distributed denial of service"
11 条 记 录,以下是1-10 订阅
排序:
A Machine Learning-Based distributed denial of service Detection Approach for Early Warning in Internet Exchange Points
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 2235-2259页
作者: Salem Alhayani Diane R.Murphy School of Technology and Innovation College of Business InnovationLeadershipand Technology(BILT)Marymount UniversityArlingtonVirginia22207USA
The Internet service provider(ISP)is the heart of any country’s Internet infrastructure and plays an important role in connecting to theWorld *** exchange point(IXP)allows the interconnection of two or more separate ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Adaptive Butterfly Optimization Algorithm(ABOA)Based Feature Selection and Deep Neural Network(DNN)for Detection of distributed denial-of-service(DDoS)Attacks in Cloud
收藏 引用
Computer Systems Science & Engineering 2023年 第10期47卷 1109-1123页
作者: S.Sureshkumar G.K.D.Prasanna Venkatesan R.Santhosh Department of Computer Science and Engineering Karpagam Academy of Higher EducationCoimbatore641021India Dean Engineering Faculty EngineeringKarpagam Academy of Higher EducationCoimbatore641021India Department of Computer Science and Engineering Faculty of EngineeringKarpagam Academy of Higher EducationCoimbatore641021India
Cloud computing technology provides flexible,on-demand,and completely controlled computing resources and services are highly desirable.Despite this,with its distributed and dynamic nature and shortcomings in virtualiz... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3571-3588页
作者: Yousef Sanjalawe Turke Althobaiti Cybersecurity Department Faculty of Information TechnologyAmerican University of Madaba(AUM)Amman11821Jordan Computer Science Department PY CollageNorthern Border University(NBU)9280 NBUAr’arSaudi Arabia Computer Science Department Faculty of ScienceNorthern Border University(NBU)9280 NBUAr’arSaudi Arabia Remote Sensing Northern Border University(NBU) 9280 NBUAr’arSaudi Arabia
Intrusion Detection System(IDS)in the cloud Computing(CC)environment has received paramount interest over the last few years.Among the latest approaches,Deep Learning(DL)-based IDS methods allow the discovery of attac... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 1403-1416页
作者: Mohammad Adnan Aladaileh Mohammed Anbar Iznan H.Hasbullah Abdullah Ahmed Bahashwan Shadi Al-Sarawn National Advanced IPv6 Centre of Excellence Universiti Sains MalaysiaPenangMalaysia
The emergence of a new network architecture,known as Software Defined Networking(SDN),in the last two decades has overcome some drawbacks of traditional networks in terms of performance,scalability,reliability,securit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Smart Contract Based DDoS Attack Traceability Audit Mechanism in Intelligent IoT
收藏 引用
China Communications 2023年 第8期20卷 54-64页
作者: Zhuohao Wang Weiting Zhang Runhu Wang Ying Liu Chenyang Xu Chengxiao Yu Institute of Scientific and Technical Information of China Beijing 100038China School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China
In this paper,we focus on providing data provenance auditing schemes for distributed denial of service(DDoS)defense in intelligent internet of things(IoT).To achieve effective DDoS defense,we introduce a two-layer col... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 491-515页
作者: Shadi Al-Sarawi Mohammed Anbar Basim Ahmad Alabsi Mohammad Adnan Aladaileh Shaza Dawood Ahmed Rihan National Advanced IPv6 Centre(NAv6) University Sains MalaysiaGelugorPenang11800Malaysia Applied College Najran UniversityKing Abdulaziz StreetP.O.Box 1988NajranSaudi Arabia Cybersecurity Department School of Information TechnologyAmerican University of Madaba(AUM)Amman11821Jordan
The Internet of Things(IoT)consists of interconnected smart devices communicating and collecting data.The Routing Protocol for Low-Power and Lossy Networks(RPL)is the standard protocol for Internet Protocol Version 6(... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques
收藏 引用
Computer Systems Science & Engineering 2023年 第6期45卷 2553-2567页
作者: Anitha Thangasamy Bose Sundan Logeswari Govindaraj Department of Computer Science and Engineering College of Engineering GuindyAnna UniversityChennai-600025TamilndauIndia
The recent development of cloud computing offers various services on demand for organization and individual users,such as storage,shared computing space,networking,etc.Although Cloud Computing provides various advanta... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Toward Secure Software-Defined Networks Using Machine Learning: A Review, Research Challenges, and Future Directions
收藏 引用
Computer Systems Science & Engineering 2023年 第11期47卷 2201-2217页
作者: Muhammad Waqas Nadeem Hock Guan Goh Yichiet Aun Vasaki Ponnusamy Faculty of Information and Communication Technology Universiti Tunku Abdul RahmanKamparPerakMalaysia Higher Colleges of Technology Fujairah Men’s CampusFujairahUAE
Over the past few years,rapid advancements in the internet and communication technologies have led to increasingly intricate and diverse networking systems.As a result,greater intelligence is necessary to effectively ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller
收藏 引用
Computers, Materials & Continua 2021年 第10期69卷 373-391页
作者: Mohammad Aladaileh Mohammed Anbar Iznan H.Hasbullah Yousef K.Sanjalawe Yung-Wey Chong National Advanced IPv6 Centre of Excellence Universiti Sains MalaysiaPenangMalaysia Department of Computer Sciences Northern Border UniversityAr’arKingdom of Saudi Arabia
The Software-Defined Networking(SDN)technology improves network management over existing technology via centralized network control.The SDN provides a perfect platform for researchers to solve traditional network’s o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Detecting DDoS Attacks against Web Server Using Time Series Analysis
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第1期11卷 175-180页
作者: WU Qing-tao SHAO Zhi-qing Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China
distributed denial of service (DDoS) attack is a major threat to the availability of Web service. The inherent presence of self-similarity in Web traffic motivates the applicability of time series analysis in the st... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论