LVQ models of DDOS attacks identification

被引:0
|
作者
Babenko, Tetiana [1 ]
Toliupa, Serhii [1 ]
Kovalova, Yuliia [2 ]
机构
[1] Taras Shevehenko Natl Univ Kyiv, Kiev, Ukraine
[2] Natl Min Univ, Dnipro, Ukraine
关键词
cybersecurity; information security; model identification DDoS attacks; neural network model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber security management of systems in the cyberspace has been a challenging problem for both practitioners and the research community. Their proprietary nature along with the complexity renders traditional approaches rather insufficient and creating the need for the adoption of a holistic point of view. In this paper describe approaches to synthesis of the identification models based on LVQ neural networks. The results of research testify to the prospects of work in this direction.
引用
收藏
页码:510 / 513
页数:4
相关论文
共 50 条
  • [1] Botnet Identification in Randomized DDoS Attacks
    Matta, Vincenzo
    Di Mauro, Mario
    Longo, Maurizio
    2016 24TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2016, : 2260 - 2264
  • [2] DDoS Attacks Detection by Means of Statistical Models
    Andrysiak, Tomasz
    Saganowski, Lukasz
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER RECOGNITION SYSTEMS, CORES 2015, 2016, 403 : 797 - 806
  • [3] Botnet Identification in DDoS Attacks With Multiple Emulation Dictionaries
    Cirillo, Michele
    Di Mauro, Mario
    Matta, Vincenzo
    Tambasco, Marco
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3554 - 3569
  • [4] Botnet Identification in Multi-Clustered DDoS Attacks
    Matta, Vincenzo
    Di Mauro, Mario
    Longo, Maurizio
    2017 25TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2017, : 2171 - 2175
  • [5] A path identification mechanism for effective filtering against DDoS attacks
    Ahn, Y
    Wee, K
    Hong, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 325 - 330
  • [6] A source identification scheme against DDoS attacks in cluster interconnects
    Lee, M
    Kim, EJ
    Lee, CW
    2004 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2004, : 354 - 361
  • [7] A dynamic path identification mechanism to defend against DDoS attacks
    Lee, G
    Lim, H
    Hong, M
    Lee, DH
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 806 - 813
  • [8] Deep learning based identification of DDoS attacks in industrial application
    Bhati, Akhilesh
    Bouras, Abdelaziz
    Qidwai, Uvais Ahmed
    Belhi, Abdelhak
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 190 - 196
  • [9] Pi: A path identification mechanism to defend against DDoS attacks
    Yaar, A
    Perrig, A
    Song, D
    2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 93 - 107
  • [10] A Review on DDoS Attacks Classifying and Detection by ML/DL Models
    Alqahtani, Haya Malooh
    Abdullah, Monir
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (02) : 824 - 833