NGHIÊN CỨU PHƯƠNG PHÁP PHÁT HIỆN SỚM XÂM NHẬP BẤT THƯỜNG MẠNG DDOS DỰA TRÊN CÁC THUẬT TOÁN HỌC MÁY
Thông tin bài báo
Ngày nhận bài: 11/07/22                Ngày hoàn thiện: 05/08/22                Ngày đăng: 05/08/22Tóm tắt
Từ khóa
Toàn văn:
PDFTài liệu tham khảo
[1] Y. Cao, “Understanding Internet DDoS Mitigation from Academic and Industrial Perspectives,” IEEE Acess, vol. 6, pp. 66641-66648, 2018.
[2] B. Sunny, “D-FACE: An anomaly based distributed approach for early detection of DDoS attacks,” Journal of Network and Computer Applications, vol. 111, pp. 49-63, 2018.
[3] H. HadianJazi, “Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling,” Journal of Computer Networks, vol. 121, pp. 25-36, 2017.
[4] N. Muraleedharan and B. Janet, “A deep learning based HTTP slow DoS classification approach using flow data,” ICT Express, vol. 7, no. 2, pp. 210-214, 2021.
[5] Y. Zhen, “A systematic literature review of methods and datasets for anomaly-based network intrusion detection,” Journal of Computers & Security, vol. 116C, pp. 1-10, 2022.
[6] E. Alhajjar, “Adversarial machine learning in Network Intrusion Detection Systems,” Expert Systems with Applications, vol. 186, pp. 1-10, 2021.
[7] Y. Gu, “Multiple-Features-Based Semisupervised Clustering DDoS Detection Method,” Mathematical Problems in Engineering, vol. 2017, pp. 1-10, 2017.
[8] K. Saravanan, “Detection mechanism for distributed denial of service (DDoS) attacks for anomaly detection system,” Journal of Theoretical and Applied information Technology, vol. 60, pp. 174-178, 2014.
[9] Y. Liao and R. V. Vemuri, “Use of K-Nearest Neighbor classifier for intrusion detection,” Computers & Security, vol. 21, no. 5, pp. 439-448, 2002.
[10] M. Aamir and S. M. A. Zaidi, “Clustering based semi-supervised machine learning for DDoS attack classification,” Journal of King Saud University - Computer and Information Sciences, vol. 33, no. 4, pp. 436-446, 2021.
[11] F. A. F. Silveira, A. M. B. Junior, G. V. Solar, and L. F. Silveira, “Smart Detection: An Online Approach for DoS/DDoS Attack,” Security and Communication Networks, vol. 2019, pp. 1-15, 2019.
[12] J. Long, "TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest," Security and Communication Networks, vol. 2018, no. 1, pp. 1-9, 2018.
[13] A. Maraj, “Testing of network security systems through DoS attacks,” in Embedded Computing (MECO), 6th Mediterranean Conference on IEEE, pp. 368-373, 2017.
[14] T. T. Tran and H. H. Le, “Study technique to limit bandwidth spending from DDoS attacks,” Dalat University Journal of Science, vol. 7, pp. 52-61, 2020.
[15] H. H. Le, “Improve network security system in Vietnam using reverse method,” TNU Journal of Science and Technology, vol. 225, no. 09, pp. 125-133, 2020.
[16] H. H. Le, “Study to applying Blockchain technology for preventing of spam email,” TNU - Journal of Science and Technology, vol. 208, no. 15, pp. 161-167, 2019.
[17] H. H. Le, “Study the method of implementation of Border Gateway Protocol on IPv4 and IPv6 infrastructure by analysis and evaluate of some properties affecting protocol performance,” TNU Journal of Science and Technology, vol. 226, no. 11, pp. 149-157, 2021.
DOI: https://doi.org/10.34238/tnu-jst.6248
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu





