Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS Attacks
biblio
Challenges of DDoS Attack Mitigation in IoT Devices by Software Defined Networking (SDN)
Submitted by grigby1 on Wed, 04/13/2022 - 9:27am
Metrics
software defined networking
security
SDN architecture
Resiliency
resilience
pubcrawl
performance evaluation
network architecture
composability
IoT devices
Internet of Things
Human behavior
denial-of-service attack
DDoS attacks mitigation
DDoS Attacks
DDoS attack mitigation
computer architecture
biblio
Preventing Distributed Denial of Service Attacks in Software Defined Mesh Networks
Submitted by aekwall on Mon, 01/31/2022 - 3:15pm
Forensics
sFlow-RT
sFlow Collector
sFlow Agent
Policy Based Flow Management (PBFM)
network topology
flow tables
DDoS Attacks
Attack Detection and Mitigation
wireless mesh networks
Cloud Computing
denial-of-service attack
Firewalls (computing)
Topology
Redundancy
composability
Resiliency
Metrics
pubcrawl
SDN
biblio
WANHEDA: A Machine Learning Based DDoS Detection System
Submitted by grigby1 on Tue, 09/07/2021 - 1:03pm
Intrusion Detection
telecommunication traffic
Resiliency
resilience
pubcrawl
Metrics
machine learning algorithms
machine learning
intrusion detection system
composability
Internet service providers
internet
Human behavior
denial-of-service attack
DDoS Attacks
DDoS attack detection
Computer crime
biblio
Assessment of Machine Learning Techniques for Building an Efficient IDS
Submitted by grigby1 on Fri, 04/09/2021 - 10:35am
telecommunication traffic
realistic background traffic
IDS dataset
efficient IDS
complex environments
CICIDS2017 dataset
denial-of-service attack
cyberattack
IDS
resilience
Buildings
Cyber Attacks
DDoS Attacks
learning (artificial intelligence)
real-time systems
composability
machine learning techniques
telecommunication security
computer network security
Resiliency
pubcrawl
Intrusion Detection Systems
Intrusion Detection
security
machine learning
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 10:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
biblio
Polymorphic Adversarial DDoS attack on IDS using GAN
Submitted by aekwall on Mon, 03/29/2021 - 10:57am
adversarial data
Intrusion Detection
Generators
generative adversarial networks
Predictive Metrics
Malicious Traffic
Intrusion Detection Systems
gan
adversarial attacks
natural language processing
adversarial DDoS attacks
Attack Profile
defensive systems
generative adversarial networks (GAN)
polymorphic Adversarial DDoS attack
unknown types
Generative Adversarial Learning
security of data
Training
incremental learning
machine learning
pubcrawl
Resiliency
learning (artificial intelligence)
feature extraction
DDoS Attacks
machine learning algorithms
Data models
malware
telecommunication security
Scalability
IDS
computer network security
biblio
Deep Learning Enabled Intrusion Detection and Prevention System over SDN Networks
Submitted by grigby1 on Tue, 03/09/2021 - 1:38pm
SAE
malicious packets
MLP
Multilayer Perceptron
multilayer perceptrons
network configuration
packet length
Payloads
policy-based governance
prevention system
pubcrawl
machine learning
SDN networks
SDN switch
secure shell brute-force attacks
Software Defined Network
software defined networking
Software Defined Networks
SSH Brute-force
SSH brute-force attack
stacked auto-encoder
Switches
deep learning models
brute force attacks
centralized management approach
Computer crime
computer network security
convolutional neural nets
convolutional neural network
data planes
DDoS Attack
DDoS Attacks
deep learning
anomalous packets
denial-of-service attacks
DL-IDPS
Force
Human behavior
Human Factors
Intrusion Detection
learning (artificial intelligence)
Long short-term memory
LSTM
biblio
A DDoS Attack Detection Method Based on Information Entropy and Deep Learning in SDN
Submitted by grigby1 on Tue, 02/16/2021 - 11:59am
DDoS Attacks
information entropy detection
fine-grained packet-based detection
DDoS attack traffic
DDoS attack detection method
convolutional neural network model
Software Defined Network
data plane
DDoS attack detection
control plane
information entropy
software defined networking
SDN
learning (artificial intelligence)
telecommunication traffic
composability
Entropy
deep learning
computer network security
Resiliency
resilience
Metrics
Human behavior
pubcrawl
convolutional neural nets
biblio
Distributed Denial of Service Defense in Software Defined Network Using OpenFlow
Submitted by grigby1 on Tue, 02/16/2021 - 11:45am
dynamic threshold
distributed denial of service attacks
denial-of-service attack
control plane
OpenFlow
application plane
centralized control
data plane
Distributed Denial of Service defense
network security threats
exponentially weighted moving average algorithm
moving average processes
network architecture solution
OpenFlow protocol
Renyi entropy
Software Defined Network
traditional network system
dynamic networks
Entropy
IP networks
pubcrawl
Metrics
resilience
Resiliency
computer network security
Heuristic algorithms
Computer crime
security
composability
telecommunication traffic
DDoS Attacks
Protocols
SDN
software defined networking
DDoS
biblio
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
resilience
malware campaigns
memory size 4.0 TByte
MikroTik
MikroTik devices
MikroTik devices landscape
MikroTik routers
pubcrawl
realistic honeypots
low-cost routers
Resiliency
RouterOS
Scalability
security
telecommunication network routing
time 45.0 d
vulnerabilities
Honey Pot
Computer crime
computer network security
core network infrastructure
core networks
core routers
DDoS Attacks
easy-to-deploy MikroTik honeypot
hacker attacks
automated attack classification
honey pots
honey-pot
Human behavior
Human Factors
internet
Internet exchanges
invasive software
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »