Velliangiri et al., 2018 - Google Patents
Investigation distributed denial of service attack classification using mlpnn-bp and mlpnn-lmVelliangiri et al., 2018
View PDF- Document ID
- 10772945060077577371
- Author
- Velliangiri S
- Selvam R
- Publication year
- Publication venue
- Journal of Computational and Theoretical Nanoscience
External Links
Snippet
The cloud computing integrates different computing technologies in providing services to users. The Denial of Service (DoS) attack is that attack where an attacker will deny the legitimate users an access to the machines and make the computing resources busy with …
- 238000009114 investigational therapy 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/06—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
- G06N3/063—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using electronic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/08—Learning methods
- G06N3/082—Learning methods modifying the architecture, e.g. adding or deleting nodes or connections, pruning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhao et al. | A dimension reduction model and classifier for anomaly-based intrusion detection in internet of things | |
Subba et al. | A neural network based system for intrusion detection and attack classification | |
Devaraju et al. | Performance comparison for intrusion detection system using neural network with KDD dataset | |
Demertzis et al. | A hybrid network anomaly and intrusion detection approach based on evolving spiking neural network classification | |
Harish et al. | Anomaly based intrusion detection using modified fuzzy clustering | |
Kachavimath et al. | A deep learning-based framework for distributed denial-of-service attacks detection in cloud environment | |
Krundyshev et al. | Hybrid neural network framework for detection of cyber attacks at smart infrastructures | |
Ishitaki et al. | Application of deep recurrent neural networks for prediction of user behavior in tor networks | |
Horeis | Intrusion detection with neural networks–combination of self-organizing maps and radial basis function networks for human expert integration | |
Ndife et al. | Cyber-Security Audit for Smart Grid Networks: An Optimized Detection Technique Based on Bayesian Deep Learning. | |
Kajal et al. | A hybrid approach for cyber security: improved intrusion detection system using Ann-Svm | |
Ishitaki et al. | A neural network based user identification for Tor networks: Data analysis using Friedman test | |
Chen et al. | Dyn-backdoor: Backdoor attack on dynamic link prediction | |
Droos et al. | Lightweight detection system for low-rate DDoS attack on software-defined-IoT | |
Velliangiri et al. | Investigation distributed denial of service attack classification using mlpnn-bp and mlpnn-lm | |
Ishitaki et al. | Application of neural networks for intrusion detection in tor networks | |
Torkaman et al. | A hybrid intelligent HIDS model using two-layer genetic algorithm and neural network | |
Siddiqui et al. | Fractal based cognitive neural network to detect obfuscated and indistinguishable internet threats | |
Thirumalairaj et al. | An intelligent feature selection with optimal neural network based network intrusion detection system for cloud environment | |
Qathrady et al. | SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things | |
Kumar et al. | Intrusion detection using artificial neural network with reduced input features | |
Arqane et al. | A review of intrusion detection systems: datasets and machine learning methods | |
Thomas et al. | DoS attack detection using Aquila deer hunting optimization enabled deep belief network | |
Singh et al. | Detecting Trojan attacks on deep neural networks | |
Ishitaki et al. | Performance evaluation of a neural network based intrusion detection system for tor networks considering different hidden units |