Investigation Model for Ddos Attack Detection in Real-Time
Investigating traffic of distributed denial of services (DDoS) attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. T...
| Main Author: | Ahmed, Abdulghani Ali |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UMP
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/11843/ http://umpir.ump.edu.my/id/eprint/11843/1/Investigation%20Model%20For%20Ddos%20Attack%20Detection%20In%20Real-Time.pdf |
Similar Items
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Traceback Model for Identifying Sources of Distributed
Attacks in Real Time
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
AIRSE : an approach for attack intention recognition based on similarity of evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018)
by: Ahmed, Abdulghani Ali
Published: (2018)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
An intelligence technique for denial of service (DoS) attack detection
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2018)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Real-time personal protective equipment compliance detection using you only look once
by: Nurhanisah, Aminuddin, et al.
Published: (2024)
by: Nurhanisah, Aminuddin, et al.
Published: (2024)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Real time bus tracking system
by: Muhammad Addeib, Mohd Subari
Published: (2019)
by: Muhammad Addeib, Mohd Subari
Published: (2019)
Epilepsy detection using EEG signals
by: Amer, Salam, et al.
Published: (2018)
by: Amer, Salam, et al.
Published: (2018)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Real time flood detection & monitoring system with wireless network sensors
by: Nur Ainina Asyra, Abdul Kadir
Published: (2016)
by: Nur Ainina Asyra, Abdul Kadir
Published: (2016)
Simple recurrent network in real time astrocyte
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
Code generation for embedded real time system
by: Talab, Mahmood Aghajani Siroos
Published: (2010)
by: Talab, Mahmood Aghajani Siroos
Published: (2010)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Real Time Water Level Detection Systems for Water Treatment Plant
by: Mohd Burhanuddin, Hamzah, et al.
Published: (2016)
by: Mohd Burhanuddin, Hamzah, et al.
Published: (2016)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Similar Items
-
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020) -
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020) -
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016) -
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)