DDoS detection using active and idle features of revised CICFlowMeter and statistical approaches
Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down targeted victim. CICFlowMeter tool generates bi-directional flows from packets. Eac...
| Main Authors: | Ali, Basheer Husham, Sulaiman, Nasri, Al-Haddad, S. A. R., Atan, Rodziah, Mohd Hassan, Siti Lailatul |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
IEEE
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/37800/ |
Similar Items
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017)
by: Maslan, Andi, et al.
Published: (2017)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection
System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Detection of different types of distributed denial of service attacks using multiple features of entropy and sequential probabilities ratio test
by: Ali, Basheer Husham, et al.
Published: (2023)
by: Ali, Basheer Husham, et al.
Published: (2023)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
by: Harun, Zati Bayani
Published: (2019)
by: Harun, Zati Bayani
Published: (2019)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
by: Waqar, Ali, et al.
Published: (2015)
by: Waqar, Ali, et al.
Published: (2015)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Identification of distributed denial of services anomalies by using combination of entropy and sequential probabilities ratio test methods
by: Ali, Basheer Husham, et al.
Published: (2021)
by: Ali, Basheer Husham, et al.
Published: (2021)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
DDOS avoidance strategy for service avalibilty
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
by: AlRashidi, Bedour Fahhad Hamed
Published: (2015)
PID controller for idle speed control
by: Tuan Kamaruddin, Tengku Nordayana Akma, et al.
Published: (2013)
by: Tuan Kamaruddin, Tengku Nordayana Akma, et al.
Published: (2013)
The appropriate measures in developing IDLE waqf land
by: Syed Abdul Kader, Sharifah Zubaidah
Published: (2016)
by: Syed Abdul Kader, Sharifah Zubaidah
Published: (2016)
"Not an idle spectator": Geoffrey Hill as model reviewer
by: Vincent, Bridget
Published: (2014)
by: Vincent, Bridget
Published: (2014)
The potential of waqf in activating idle agricultural land
by: Muhammad Hakimi Mohd Shafiai,, et al.
Published: (2015)
by: Muhammad Hakimi Mohd Shafiai,, et al.
Published: (2015)
Utilisation of Idle Padi Lands in Negeri Sembilan
by: Hussein, Mohd Ariff, et al.
Published: (1982)
by: Hussein, Mohd Ariff, et al.
Published: (1982)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Simulation model to minimize idle time at the shipping transportation
by: Nur Sabihah, Ahmad
Published: (2014)
by: Nur Sabihah, Ahmad
Published: (2014)
Dynamic weighted idle time heuristic for flowshop scheduling
by: Zainudin, Amira Syuhada
Published: (2017)
by: Zainudin, Amira Syuhada
Published: (2017)
Similar Items
-
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)