A DoS attack defense model adopting data mining

被引:0
|
作者
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China [1 ]
机构
来源
Dianzi Keji Diaxue Xuebao | 2008年 / 4卷 / 586-589期
关键词
Filtration - Internet protocols - Denial-of-service attack - Network security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Association rule mining in DoS attack detection and defense in the application of network
    Zheng, Jigang
    Zhang, Jingmei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MEDICINE (EMIM 2015), 2015, 8 : 445 - 449
  • [2] A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques
    Djanie, Kotey Seth
    Tutu, Tchao Eric
    Dzisi, Gadze James
    COMPUTERS, 2019, 8 (04)
  • [3] An Analysis on DOS Attack and Defense Technology
    Lin Jingna
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1102 - 1105
  • [4] Defense mechanisms for internal doS attack in a cloud
    Shu, Ni-Na
    Wang, Huai-Xi
    Wang, Chen
    Fang, Fang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONIC INFORMATION ENGINEERING (CEIE 2016), 2016, 116 : 27 - 36
  • [5] A Data Mining Based Approach towards Detection of Low Rate DoS Attack
    Sharma, Mohit
    Unde, Nimish
    Borude, Ketan
    Paradkar, Amol
    2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [6] DoS attack mining in sensor node replacement
    Shwe, Hnin Yu
    Lee, Bong Jae
    Lee, Jang-See
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 11 - +
  • [7] Defense against DoS Attack: PSO Approach in Virtualization
    Mercyshalinie, S.
    Madhupriya, G.
    Vairamani, S.
    Velayutham, S.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 199 - 204
  • [8] A Defense Method against Distributed Slow HTTP DoS Attack
    Hirakawa, Tetsuya
    Ogura, Kanayo
    Bista, Bhed Bahadur
    Takata, Toyoo
    PROCEEDINGS OF 2016 19TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS), 2016, : 152 - +
  • [9] Knowledge Mining in Cybersecurity: From Attack to Defense
    Akbar, Khandakar Ashrafi
    Halim, Sadaf Md
    Hu, Yibo
    Singhal, Anoop
    Khan, Latifur
    Thuraisingham, Bhavani
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 110 - 122
  • [10] Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining
    Sheng, Jingyuan
    MOBILE INFORMATION SYSTEMS, 2022, 2022