scispace - formally typeset
Journal ArticleDOI

Deep learning binary fruit fly algorithm for identifying SYN flood attack from TCP/IP

TLDR
In this article, a novel binary fruit fly optimization algorithm with deep learning is proposed to predict the syn flood attack, which is one form of distributed denial of service attack that attains the handshake process of TCP.
About
This article is published in Materials Today: Proceedings.The article was published on 2021-07-22. It has received 4 citations till now. The article focuses on the topics: SYN flood & Denial-of-service attack.

read more

Citations
More filters
Journal ArticleDOI

DDoS Attack Detection Using Hybrid Machine Learning Based IDS Models

TL;DR: In order to improve the performance of the machine learning based intrusion detection models, an attempt is made to feed the SVM and KNN based IDS model with the features selected by C4.5 classifier algorithm, and the obtained performance metric values are reported.
Journal ArticleDOI

A SYN Flood Attack Detection Method Based on Hierarchical Multihead Self-Attention Mechanism

TL;DR: A SYN flood attack detection method based on the Hierarchical Multihad Self-Attention (HMHSA) mechanism that presents better in feature selection and higher detection accuracy.
Proceedings ArticleDOI

Application of Data Guidance Site Generation Technology in the Cloud Platform Supporting the Construction of Subject Teams in Finance and Economics Applied Universities

TL;DR: In this paper , the Trinity entrepreneurship project is an entrepreneurial practice teaching mode explored and practiced by finance and economics colleges and universities, project authenticity, knowledge integration, diversity and openness, teamwork and good attitude and other teaching characteristics.
Proceedings ArticleDOI

Application of Data Guidance Site Generation Technology in the Cloud Platform Supporting the Construction of Subject Teams in Finance and Economics Applied Universities

Luxia Li, +1 more
TL;DR: In this article , the Trinity entrepreneurship project is an entrepreneurial practice teaching mode explored and practiced by finance and economics colleges and universities, project authenticity, knowledge integration, diversity and openness, teamwork and good attitude and other teaching characteristics.
References
More filters
Journal ArticleDOI

Toward developing a systematic approach to generate benchmark datasets for intrusion detection

TL;DR: The intent for this dataset is to assist various researchers in acquiring datasets of this kind for testing, evaluation, and comparison purposes, through sharing the generated datasets and profiles.
Proceedings ArticleDOI

Cost-based modeling for fraud and intrusion detection: results from the JAM project

TL;DR: There is clear evidence that state-of-the-art commercial fraud detection systems can be substantially improved in stopping losses due to fraud by combining multiple models of fraudulent transaction shared among banks.
Proceedings ArticleDOI

Early detection of DDoS attacks against SDN controllers

TL;DR: This paper shows how DDoS attacks can exhaust controller resources and provides a solution to detect such attacks based on the entropy variation of the destination IP address and introduces a solution that is effective and lightweight in terms of the resources that it uses.
Proceedings ArticleDOI

DeepDefense: Identifying DDoS Attack via Deep Learning

TL;DR: A recurrent deep neural network to learn patterns from sequences of network traffic and trace network attack activities and reduces the error rate compared with conventional machine learning method in the larger data set.
Proceedings ArticleDOI

An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking

TL;DR: An entropy-based lightweight DDoS flooding attack detection model running in the OF edge switch is proposed and the detection mechanism can detect the attack quickly and achieve a high detection accuracy with a low false positive rate.
Related Papers (5)
Trending Questions (2)
How do syn flood attacks work?

The paper does not provide information on how SYN flood attacks work.

What are the most effective machine learning algorithms for detecting tcp flood attacks?

The proposed DL-BFFA algorithm achieved 99.96% detection accuracy for detecting SYN Flood Attacks.