Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS attack detection
biblio
User Behavior Anomaly Detection for Application Layer DDoS Attacks
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
legitimate application layer requests
web services
Web servers
user behavior anomaly detection method
subspace anomaly detection method
student resource portal
Resiliency
pubcrawl
Protocols
protocol characteristics
principle component analysis
principal component analysis
Penetration Testing
PCA-subspace
PCA
Metrics
anomalous behavior instance detection
internet
Human behavior
HTTP Web server logs
HTTP DDoS attacks
file servers
feature extraction
distributed denial of service attacks
DDoS attack detection
Cyber Attacks
computer network security
Computer crime
composability
Browsers
application layer DDoS attacks
Anomaly Detection
biblio
Network parameters applicable in detection of infrastructure level DDoS attacks
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
network packets
Traffic flow
telecommunication traffic
resource availability
Resiliency
pubcrawl
Protocols
Ports (Computers)
network security
Anomaly Detection
Metrics
IP networks
Human behavior
Entropy
Electronic mail
DDoS attack detection
Computer crime
composability
biblio
DDoS attack detection approach using an efficient cluster analysis in large data scale
Submitted by grigby1 on Tue, 01/16/2018 - 5:25pm
network security
genuine network flow identification
host-based resources
Human behavior
Intrusion Detection
intrusion detection system
large data scale
legitimate users
Metrics
network resources
flooding attack packets
packets windowing
pattern clustering
Phi coefficient
pubcrawl
Resiliency
resource allocation
Shape
unsupervised data mining
wireless sensor networks
CURE
CAIDA2008 datasets
cluster analysis
clustering
Clustering algorithms
clustering using representative
composability
Computer crime
computer network security
congestion-based attack
CAIDA2007 datasets
DARPA2000 datasets
Data mining
DDoS attack detection
detection rate
Distributed Denial of Service (DDoS)
distributed denial of service attack
Entropy
F measure
false alarm rate
biblio
Machine Learning Based DDoS Attack Detection from Source Side in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
machine learning based DDoS attack detection
Virtual machining
virtual machines
Virtual machine monitors
virtual machine monitor
telecommunication computing
statistical information
statistical analysis
Servers
Resiliency
pubcrawl
network traffic
network security
network packages
Metrics
Cloud Computing
machine learning algorithms
machine learning
learning (artificial intelligence)
Human behavior
feature extraction
Denial of Service attacks
DDoS attack detection
DDoS Attack
computer network security
Computer crime
composability
cloud server hypervisor
cloud provider
biblio
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
pubcrawl
feature extraction
Human behavior
internal attackers
internal threats detection
Intrusion Detection
Law
Markov processes
Metrics
DTMC
query processing
Resiliency
Servers
SQL
SQL queries
User behavior
users behaviors analysis
database system
Anomaly Detection
anomaly detection system
Application Layer
behavior features extraction
composability
Computer crime
computer network security
database management systems
anomaly behavior
Databases
DDoS attack detection
DDOS attack detection system
discrete-time markov chain
discrete-time Markov chains
distributed denial of service attack
distributed denial of service attacks
biblio
Proactive DDoS attack detection and isolation
Submitted by grigby1 on Tue, 01/16/2018 - 5:24pm
legitimate clients
Servers
security controls
resource allocation
Resiliency
pubcrawl
proxy level
proactive DDoS attack isolation
proactive DDoS attack detection
MTD
Monitoring
Migration
Metrics
Load management
load balancing
Attack proxy
IP networks
insider-assisted DDoS attack mitigation
Insider-assisted DDoS attack
Human behavior
EDIP
early detection-and-isolation policy
distributed denial of service
DDoS attack detection
Data processing
cyber threat
Cyber Attacks
computer network security
Computer crime
composability
biblio
User behaviour modelling based DDoS attack detection
Submitted by BrandonB on Thu, 04/30/2015 - 12:16pm
expectation maximization
user modelling
user modeling
user behaviour modelling
telecommunication traffic
signal processing
network system
Mathematical model
IP networks
Human Factors
Adaptation models
EM
distributed denial of service
destination IP traffic
DDoS attack detection
DDoS
Conferences
computer network security
Computer crime
Anomaly Detection
« first
‹ previous
1
2
3
4
5
6
7