An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Recently, damage caused by DDoS attacks increases year by year. Along with the advancement of communication technology, this kind of attack also evolves and it has become more complicated and hard to detect using flash crowd agent, slow rate attack and also amplification attack that exploits a vulne...
| Main Authors: | Yusof, Ahmad Riza’ain, Udzir, Nur Izura, Selamat, Ali |
|---|---|
| Other Authors: | Fujita, Hamido |
| Format: | Book Section |
| Language: | English |
| Published: |
Springer
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/52677/ http://psasir.upm.edu.my/id/eprint/52677/1/An%20evaluation%20on%20KNN-SVM%20algorithm%20for%20detection%20and%20prediction%20of%20DDoS%20attack.pdf |
Similar Items
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
by: Harun, Zati Bayani
Published: (2019)
by: Harun, Zati Bayani
Published: (2019)
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017)
by: Maslan, Andi, et al.
Published: (2017)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection
System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
kNN and SVM classification for EEG: a review
by: Fuad, N., et al.
Published: (2020)
by: Fuad, N., et al.
Published: (2020)
DDoS detection using active and idle features of revised CICFlowMeter and statistical approaches
by: Ali, Basheer Husham, et al.
Published: (2022)
by: Ali, Basheer Husham, et al.
Published: (2022)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm
for Water Quality Classification Based on Contaminant Parameters
by: Teguh, Sutanto, et al.
Published: (2024)
by: Teguh, Sutanto, et al.
Published: (2024)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Stock Price Prediction of Bank Rakyat Indonesia Using an Ensemble Stacking Model of K-Nearest Neighbors (KNN) and Support Vector Machine (SVM)
by: Muhammad, Tamami, et al.
Published: (2025)
by: Muhammad, Tamami, et al.
Published: (2025)
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
by: Waqar, Ali, et al.
Published: (2015)
by: Waqar, Ali, et al.
Published: (2015)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
KNN Algorithm to Determine Optimum Agricultural Commodities in Smart Farming
by: Cucus, Ahmad, et al.
Published: (2023)
by: Cucus, Ahmad, et al.
Published: (2023)
Similar Items
-
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019) -
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)