Cross-Domain Privacy-Preserving Cooperative Firewall Optimization

Author(s):  
Alex X. Liu ◽  
Rui Li
2013 ◽  
Vol 21 (3) ◽  
pp. 857-868 ◽  
Author(s):  
Fei Chen ◽  
Bezawada Bruhadeshwar ◽  
Alex X. Liu

2019 ◽  
Vol 16 (6) ◽  
pp. 930-943 ◽  
Author(s):  
Qingjun Chen ◽  
Shouqian Shi ◽  
Xin Li ◽  
Chen Qian ◽  
Sheng Zhong

In this paper, we present a review of on hand IDS (Intrusion Detection Techniques) for DDoS assaults. Interruption discovery framework is a well known and computationally costly task. We additionally clarify the essentials of interruption identification framework. We represent the present methodologies for Intrusion Detection framework. From the expansive assortment of proficient procedures that have been created we will look at the most significant ones. Their qualities and shortcomings are likewise researched. For reasons unknown, the conduct of the calculations is substantially more comparative as not out of the ordinary.


Author(s):  
Xue Yang ◽  
Rongxing Lu ◽  
Kim-Kwang Raymond Choo ◽  
Fan Yin ◽  
Xiaohu Tang

Sign in / Sign up

Export Citation Format

Share Document