Velliangiri et al., 2018 - Google Patents

Investigation distributed denial of service attack classification using mlpnn-bp and mlpnn-lm

Velliangiri et al., 2018

View PDF
Document ID
10772945060077577371
Author
Velliangiri S
Selvam R
Publication year
Publication venue
Journal of Computational and Theoretical Nanoscience

External Links

Snippet

The cloud computing integrates different computing technologies in providing services to users. The Denial of Service (DoS) attack is that attack where an attacker will deny the legitimate users an access to the machines and make the computing resources busy with …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/06Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
    • G06N3/063Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/08Learning methods
    • G06N3/082Learning methods modifying the architecture, e.g. adding or deleting nodes or connections, pruning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Zhao et al. A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things
Subba et al. A neural network based system for intrusion detection and attack classification
Devaraju et al. Performance comparison for intrusion detection system using neural network with KDD dataset
Demertzis et al. A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification
Harish et al. Anomaly based intrusion detection using modified fuzzy clustering
Kachavimath et al. A deep learning-based framework for distributed denial-of-service attacks detection in cloud environment
Krundyshev et al. Hybrid neural network framework for detection of cyber attacks at smart infrastructures
Ishitaki et al. Application of deep recurrent neural networks for prediction of user behavior in tor networks
Horeis Intrusion detection with neural networks–combination of self-organizing maps and radial basis function networks for human expert integration
Ndife et al. Cyber-Security Audit for Smart Grid Networks: An Optimized Detection Technique Based on Bayesian Deep Learning.
Kajal et al. A hybrid approach for cyber security: improved intrusion detection system using Ann-Svm
Ishitaki et al. A neural network based user identification for Tor networks: Data analysis using Friedman test
Chen et al. Dyn-backdoor: Backdoor attack on dynamic link prediction
Droos et al. Lightweight detection system for low-rate DDoS attack on software-defined-IoT
Velliangiri et al. Investigation distributed denial of service attack classification using mlpnn-bp and mlpnn-lm
Ishitaki et al. Application of neural networks for intrusion detection in tor networks
Torkaman et al. A hybrid intelligent HIDS model using two-layer genetic algorithm and neural network
Siddiqui et al. Fractal based cognitive neural network to detect obfuscated and indistinguishable internet threats
Thirumalairaj et al. An intelligent feature selection with optimal neural network based network intrusion detection system for cloud environment
Qathrady et al. SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things
Kumar et al. Intrusion detection using artificial neural network with reduced input features
Arqane et al. A review of intrusion detection systems: datasets and machine learning methods
Thomas et al. DoS attack detection using Aquila deer hunting optimization enabled deep belief network
Singh et al. Detecting Trojan attacks on deep neural networks
Ishitaki et al. Performance evaluation of a neural network based intrusion detection system for tor networks considering different hidden units