Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DDoS
biblio
Distributed Denial Of Service(DDoS) Mitigation in Software Defined Network using Blockchain
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
collaborative DDoS mitigation architecture
Topology
smart contracts
DDoS Attack
contracts
smart contract
private blockchain
software-defined networking
autonomous systems
SDN
DDoS
DDoS Prevention Service
distributed denial of service attack
DPS
network threat
Soft Defined Network
DDoS attack mitigation
Human behavior
computer network security
IP networks
telecommunication traffic
Cryptography
telecommunication security
security
software defined networking
Resiliency
Computer crime
pubcrawl
composability
Peer-to-peer computing
Metrics
blockchain
Distributed databases
network topology
biblio
Scalable DDoS Mitigation System
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
detection
DDoS attack mitigation
protection
multitarget DDoS attacks
modular filtering system
filtration
DDoS mitigation system
DDoS attacks filtering
data center
data centers
tools
internet
Metrics
Computer crime
composability
pubcrawl
Human behavior
Resiliency
Hardware
Servers
IP networks
distributed denial of service attacks
Monitoring
DDoS
computer network security
biblio
Entropy based mitigation of Distributed-Denial-of-Service (DDoS) attack on Control Plane in Software-Defined-Network (SDN)
Submitted by aekwall on Mon, 06/29/2020 - 12:56pm
network architecture
DDoS attack mitigation
software-defined-network
networking concept
entropy based mitigation
distributed-denial-of-service attack
centralized control management
centralized control
architectural change
mitigation
denial-of-service attack
control plane
data plane
DDoS Attack
Switches
computer network security
attack
SDN
network topology
Entropy
vulnerabilities
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
IP networks
DDoS
biblio
Detection and Mitigation of DDoS Attacks Using Conditional Entropy in Software-defined Networking
Submitted by aekwall on Mon, 06/29/2020 - 12:47pm
DDoS attack mitigation
SDN security
network revolution
mitigation
lightweight approach
DDoS attack detection
control logic
conditional entropy
centralized management unit
centralized control
basic packet forwarding equipment
network resources
centralised control
DDoS detection
computer network security
distributed denial of service attacks
telecommunication control
SDN
software-defined networking
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
DDoS
biblio
Detection of DDoS Attacks and Flash Events Using Shannon Entropy, KOAD and Mahalanobis Distance
Submitted by aekwall on Mon, 06/29/2020 - 12:47pm
abnormal traffic
DDoS attack detection
simulated DDoS attacks
Shannon entropy
Mahalanobis distance
KOAD
Internet enabled services
Internet based services
hybrid method
Flash Event
FE traffic
DDoS attack simulation
analogous flash events
computer network security
Entropy
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
telecommunication traffic
IP networks
distributed denial of service attacks
DDoS
biblio
DDoS Intrusion Detection Through Machine Learning Ensemble
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
Human behavior
Support vector machines
robust defense mechanism
Resiliency
reduced feature set
pubcrawl
prominent attacks
NSL-KDD dataset
NIDS approach
network intrusion detection system
Metrics
machine learning ensemble
machine learning
learning (artificial intelligence)
intrusion detection system
Intrusion Detection
Artificial Neural Networks
feature extraction
ensemble models
Ensemble Machine Learning
emerging DDoS attack patterns
domain-knowledge
distributed denial of service attacks
DDoS Intrusion Detection
DDoS Attacks
DDoS attack detection
DDoS
Data models
computer network security
Computer crime
composability
biblio
Intrusion Detection System Model Implementation against DDOS attacks
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
prevention systems
DDoS attack detection
SNORT bandwidth traffic analysis
Snort
intrusion detection system model implementation
intrusion detection methods
intrusion actions
firewall policy
DDoS Attacks
computer installation
DDoS
Metrics
composability
pubcrawl
Human behavior
Resiliency
telecommunication traffic
firewalls
IDS
biblio
DDoS Attack Detection Using Greedy Algorithm and Frequency Modulation
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
network services
DDoS attack detection
source IP addresses
source IP
probability distributions
Probability distribution
greedy
Frequency modulation
divergence
detection phase
destination IP addresses
destination IP
DDoS attack detection algorithm
greedy algorithms
greedy algorithm
Computer crime
Dogs
probability
Anomaly Detection
Entropy
Metrics
composability
pubcrawl
Human behavior
Resiliency
distributed denial of service attack
IP networks
DDoS
computer network security
biblio
An Improved Method of DDoS Attack Detection for Controller of SDN
Submitted by aekwall on Mon, 06/29/2020 - 12:46pm
Attack detection
DDoS attack detection
real-time DDoS detection attack method
openflow switch
DDoS attack traffic detection
DDoS attack feature
controller overhead
BiLSTM-RNN neural network algorithm
BiLSTM-RNN
SDN environment
distributed denial of service attacks
telecommunication control
Software Defined Network
computer network security
recurrent neural nets
SDN controller
SDN
Metrics
composability
pubcrawl
Human behavior
Resiliency
software defined networking
telecommunication traffic
DDoS
biblio
Game-Theoretic Planning to Counter DDoS in NEMESIS
Submitted by aekwall on Mon, 06/08/2020 - 11:24am
Human Factors
security and privacy
packet-level simulation
network maneuvers
NEMESIS
game-theoretic planning
game theoretic optimal courses of action
distributed denial-of-service attacks
COA
analytical wargaming
game theoretic security
Predictive Metrics
Computer crime
Games
Mathematical model
Planning
Analytical models
pubcrawl
game theory
Servers
Scalability
distributed denial of service attacks
DDoS
computer network security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »