A Machine Learning Approach for DDoS (Distributed Denial of Service) Attack Detection Using Multiple Linear Regression
نویسندگان
چکیده
منابع مشابه
Application Layer DDOS Attack Detection Using Hybrid Machine Learning Approach
Application Layer Distributed Denial of Service (App-DDoS) attack has become a major threat to web security. Attack detection is difficult as they mimic genuine user request. This paper proposes a clustering based correlation approach for detecting application layer DDoS attack on HTTP protocol. Proposed approach has two main modules ----Flow monitoring module and User behavior monitoring modul...
متن کاملDetection Mechanism for Distributed Denial of Service (DDoS) Attack in Mobile Ad-hoc Networks
Mobile ad hoc networks are non-static networks which formed without any central point communication infrastructure. In addition to node mobility, a ad-hoc is defined by bounded resource constraints such as bandwidth, battery power, and storage space. In this network, the intermediate nodes play role of router which routed the packets to the terminal node. The security challenges in the networks...
متن کاملAn Efficient Detection Mechanism for Distributed Denial of Service (DDoS) Attack
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing collection particular overhaul disruptions, often for total periods of instance. The relative ease and low costs of initiation such attacks, supplemented by the present insufficient sate of any feasible defense method, have made them one of the top threats to the Internet centre o...
متن کاملA Distributed Denial-of-Service(DDoS) Attack using BitTorrent Peer-to-Peer(P2P) Network
Recently, many hackers attacks are done with a distributed denial of service (DDoS) strategy. Most famous centralized peer to peer (P2P) networks can be easily used for realize these attacks. File-sharing protocols such BitTorrent or an extension of Gnutella use centralized server for orchestrate 7-level connections between peers. This procedure create a point-of-failure because malicious centr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings
سال: 2020
ISSN: 2504-3900
DOI: 10.3390/proceedings2020063051