flooding attacks
Recently Published Documents


TOTAL DOCUMENTS

298
(FIVE YEARS 88)

H-INDEX

22
(FIVE YEARS 5)

2022 ◽  
Vol 11 (3) ◽  
pp. 1-11
Author(s):  
Sudhakar Sengan ◽  
Osamah Ibrahim Khalaf ◽  
Vidya Sagar P. ◽  
Dilip Kumar Sharma ◽  
Arokia Jesu Prabhu L. ◽  
...  

Existing methods use static path identifiers, making it easy for attackers to conduct DDoS flooding attacks. Create a system using Dynamic Secure aware Routing by Machine Learning (DAR-ML) to solve healthcare data. A DoS detection system by ML algorithm is proposed in this paper. First, to access the user to see the authorized process. Next, after the user registration, users can compare path information through correlation factors between nodes. Then, choose the device that will automatically activate and decrypt the data key. The DAR-ML is traced back to all healthcare data in the end module. In the next module, the users and admin can describe the results. These are the outcomes of using the network to make it easy. Through a time interval of 21.19% of data traffic, the findings demonstrate an attack detection accuracy of over 98.19%, with high precision and a probability of false alarm.


Photonics ◽  
2021 ◽  
Vol 8 (12) ◽  
pp. 555
Author(s):  
Susu Liu ◽  
Xun Liao ◽  
Heyuan Shi

An Optical Burst Switching (OBS) network is vulnerable to Burst Header Packet (BHP) flooding attack. In flooding attacks, edge nodes send BHPs at a high rate to reserve bandwidth for unrealized data bursts, which leads to a waste of bandwidth, a decrease in network performance, and massive data loss. Machine learning techniques are utilized to detect this attack in the OBS network. In this paper, we propose a particle swarm optimization–support vector machine (PSO-SVM) model for detecting BHP flooding attacks, in which the PSO is used to optimize the parameters of the SVM. We use the dataset provided by the UCI warehouse to train and test the model. The experimental results show that the detection accuracy of the PSO-SVM model reaches 95.0%, which is 9.4%, 9.6%, 20.7%, 8% higher than naïve Bayes, SVM, k-nearest neighbor, and decision tree. Although DCNN outperforms our model, it requires more processing and training time. Collectively, our approach is effective and high-efficiency in detecting flooding attacks in optical burst switching networks and maintaining network stability and security.


2021 ◽  
Vol 13 (22) ◽  
pp. 12514
Author(s):  
Chih-Hsiang Hsieh ◽  
Wei-Kuan Wang ◽  
Cheng-Xun Wang ◽  
Shi-Chun Tsai ◽  
Yi-Bing Lin

The DDoS attack is one of the most notorious attacks, and the severe impact of the DDoS attack on GitHub in 2018 raises the importance of designing effective defense methods for detecting this type of attack. Unlike the traditional network architecture that takes too long to cope with DDoS attacks, we focus on link-flooding attacks that do not directly attack the target. An effective defense mechanism is crucial since as long as a link-flooding attack is undetected, it will cause problems over the Internet. With the flexibility of software-defined networking, we design a novel framework and implement our ideas with a deep learning approach to improve the performance of the previous work. Through rerouting techniques and monitoring network traffic, our system can detect a malicious attack from the adversary. A CNN architecture is combined to assist in finding an appropriate rerouting path that can shorten the reaction time for detecting DDoS attacks. Therefore, the proposed method can efficiently distinguish the difference between benign traffic and malicious traffic and prevent attackers from carrying out link-flooding attacks through bots.


2021 ◽  
Author(s):  
Yubaraj Gautam ◽  
Kazuhiko Sato ◽  
Bishnu Prasad Gautam ◽  
Norio Shiratori
Keyword(s):  

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Inam Ullah Khan ◽  
Asrin Abdollahi ◽  
Ryan Alturki ◽  
Mohammad Dahman Alshehri ◽  
Mohammed Abdulaziz Ikram ◽  
...  

The Internet of Things (IoT) plays an important role to connect people, data, processes, and things. From linked supply chains to big data produced by a large number of IoT devices to industrial control systems where cybersecurity has become a critical problem in IoT-powered systems. Denial of Service (DoS), distributed denial of service (DDoS), and ping of death attacks are significant threats to flying networks. This paper presents an intrusion detection system (IDS) based on attack probability using the Markov chain to detect flooding attacks. While the paper includes buffer queue length by using queuing theory concept to evaluate the network safety. Also, the network scenario will change due to the dynamic nature of flying vehicles. Simulation describes the queue length when the ground station is under attack. The proposed IDS utilizes the optimal threshold to make a tradeoff between false positive and false negative states with Markov binomial and Markov chain distribution stochastic models. However, at each time slot, the results demonstrate maintaining queue length in normal mode with less packet loss and high attack detection.


Sign in / Sign up

Export Citation Format

Share Document