Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

signature detection techniques

biblio

Visible to the public DDoS attack detection using machine learning techniques in cloud computing environments

Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
  • Protocols
  • IT technology
  • learning (artificial intelligence)
  • legacy protocols
  • machine learning
  • machine learning algorithms
  • machine learning techniques
  • management organizations
  • Metrics
  • Neural networks
  • on-demand resources
  • Intrusion Detection
  • pubcrawl
  • reduced infrastructure cost
  • Resiliency
  • security
  • signature detection techniques
  • signatures attacks
  • victim cloud infrastructures
  • Vulnerability
  • vulnerability detection
  • DDoS detection system
  • attacker
  • Cloud Computing
  • cloud computing environments
  • cloud performance
  • Compositionality
  • Computer crime
  • computer network security
  • Computers
  • DDoS Attack
  • DDoS attack detection
  • Algorithm design and analysis
  • DDoS flooding attacks
  • DDoS threat
  • Decision Tree
  • Decision trees
  • distributed denial of service
  • end users
  • Human behavior
  • innocent compromised computers
  • internet

Terms of Use  |  ©2023. CPS-VO