LVQ models of DDOS attacks identification

被引:0
|
作者
Babenko, Tetiana [1 ]
Toliupa, Serhii [1 ]
Kovalova, Yuliia [2 ]
机构
[1] Taras Shevehenko Natl Univ Kyiv, Kiev, Ukraine
[2] Natl Min Univ, Dnipro, Ukraine
关键词
cybersecurity; information security; model identification DDoS attacks; neural network model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cyber security management of systems in the cyberspace has been a challenging problem for both practitioners and the research community. Their proprietary nature along with the complexity renders traditional approaches rather insufficient and creating the need for the adoption of a holistic point of view. In this paper describe approaches to synthesis of the identification models based on LVQ neural networks. The results of research testify to the prospects of work in this direction.
引用
收藏
页码:510 / 513
页数:4
相关论文
共 50 条
  • [41] Dispersing Asymmetric DDoS Attacks with SplitStack
    Chen, Ang
    Sriraman, Akshay
    Vaidya, Tavish
    Zhang, Yuankai
    Haeberlen, Andreas
    Loo, Boon Thau
    Linh Thi Xuan Phan
    Sherr, Micah
    Shields, Clay
    Zhou, Wenchao
    PROCEEDINGS OF THE 15TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS '16), 2016, : 197 - 203
  • [42] On the effectiveness of DDoS attacks on statistical filtering
    Li, QM
    Chang, EC
    Chan, MC
    IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1373 - 1383
  • [43] Reactive Network Monitor for DDoS Attacks
    Varalakshmi, P.
    Narayanan, P. Karthik
    Hariharan, M.
    Nagaraj, P.
    Amritha, K.
    INFORMATION PROCESSING AND MANAGEMENT, 2010, 70 : 349 - 355
  • [44] Simulation of Internet DDoS attacks and defense
    Kotenko, Igor
    Ulanov, Alexander
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 327 - 342
  • [45] A queue model to detect DDos attacks
    Hao, S
    Song, H
    Jiang, WB
    Dai, YQ
    2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 106 - 112
  • [46] DDoS attacks in WSNs: detection and countermeasures
    Abidoye, Ademola P.
    Obagbuwa, Ibidun C.
    IET WIRELESS SENSOR SYSTEMS, 2018, 8 (02) : 52 - 59
  • [47] Detection and Prevention of DDoS Attacks on the IoT
    Lee, Shu-Hung
    Shiue, Yeong-Long
    Cheng, Chia-Hsin
    Li, Yi-Hong
    Huang, Yung-Fa
    APPLIED SCIENCES-BASEL, 2022, 12 (23):
  • [48] Botnet in DDoS Attacks: Trends and Challenges
    Hoque, Nazrul
    Bhattacharyya, Dhruba K.
    Kalita, Jugal K.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2242 - 2270
  • [49] Prevention of DDoS Attacks in Cloud Environment
    Manoja, I.
    Sk, Nazma Sultana
    Rani, Deevi Radha
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS AND COMPUTATIONAL INTELLIGENCE (ICBDAC), 2017, : 235 - 239
  • [50] Simulation and Analysis of Quiet DDOS Attacks
    Zhang, Jing
    Liu, Bo
    Hu, Huaping
    Chen, Lin
    Wang, Tianzuo
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 71 - 81