LVQ models of DDOS attacks identification

被引:0
|
作者
Babenko, Tetiana [1 ]
Toliupa, Serhii [1 ]
Kovalova, Yuliia [2 ]
机构
[1] Taras Shevehenko Natl Univ Kyiv, Kiev, Ukraine
[2] Natl Min Univ, Dnipro, Ukraine
关键词
cybersecurity; information security; model identification DDoS attacks; neural network model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber security management of systems in the cyberspace has been a challenging problem for both practitioners and the research community. Their proprietary nature along with the complexity renders traditional approaches rather insufficient and creating the need for the adoption of a holistic point of view. In this paper describe approaches to synthesis of the identification models based on LVQ neural networks. The results of research testify to the prospects of work in this direction.
引用
收藏
页码:510 / 513
页数:4
相关论文
共 50 条
  • [31] Systematic Literature Review of Machine Learning Models for Detecting DDoS Attacks in IoT Networks
    Luengo Vinuela, Marcos
    Roman-Gallego, Jesus-angel
    ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2024, 13
  • [32] Effect of DDoS Attacks on Traffic Features
    Erhan, Derya
    Anarim, Emin
    Kurt, Gunes Karabulut
    Kosar, Rabun
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [33] Cooperative defence against DDoS attacks
    Zhang, GS
    Parashar, M
    JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2006, 38 (01): : 69 - 84
  • [34] DDoS attacks in Industrial IoT: A survey
    Chaudhary, Shubhankar
    Mishra, Pramod Kumar
    COMPUTER NETWORKS, 2023, 236
  • [35] Unified defense against DDoS attacks
    Muthuprasanna, M.
    Manimaran, C.
    Wang, Z.
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 1047 - +
  • [36] Hybrid Traceback Scheme for DDoS Attacks
    Vipul
    Ranga, Virender
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 131 - 138
  • [37] Mitigation of DDoS Attacks in Cloud Computing
    Daffu, Preeti
    Kaur, Amanpreet
    2016 5TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND EMBEDDED SYSTEMS (WECON), 2016, : 209 - 213
  • [38] Systematic Analysis of DDoS Attacks in Blockchain
    Sheikh, Mohamad Arsalan
    Khan, Gul Zameen
    Hussain, Farookh Khadeer
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 132 - +
  • [39] Detecting DDoS Attacks in IoT Environment
    Labiod, Yasmine
    Korba, Abdelaziz Amara
    Ghoualmi-Zine, Nacira
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (02) : 145 - 180
  • [40] Cooperative mechanism against DDoS attacks
    Zhang, GS
    Parashar, M
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 86 - 96