:::

詳目顯示

回上一頁
題名:雲端環境下設計混合式泛濫攻擊防禦機制之研究
書刊名:資訊管理學報
作者:楊欣哲 引用關係黃小玲
作者(外文):Huang, Hsiao-lin
出版日期:2020
卷期:27:2
頁次:頁205-233
主題關鍵詞:雲端運算混合式泛濫攻擊特徵選擇機器學習HFADSCloud computingHybrid flooding attacksFeatures selectionMachine learning
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:7
期刊論文
1.于鵬程、戚湧、李千目(2017)。基於隨機森林分類模型的DDoS攻擊檢測方法。電腦應用研究,34(10),3068-3072。  延伸查詢new window
2.Alkasassbeh, M.、Hassanat, A. B. A.、Al-Naymat, G.、Almseidin, M.(2016)。Detecting distributed denial of service attacks using data mining techniques。International Journal of Advanced Computer Science and Application,7(1),436-445。  new window
3.Hussain, K.、Hussain, S. J.、Dillshad, V.、Nafees, M.、Azeem, M. A.(2016)。An adaptive SYN flooding attack mitigation in DDOS environment。International Journal of Computer Science and Network Security,16(7),27-33。  new window
4.Kshirsagar, D.、Sawant, S.、Rathod, A.、Wathore, S.(2016)。CPU load analysis & minimization for TCP SYN flood detection。Procedia Computer Science,85,626-633。  new window
5.Namvarasl, S.、Ahmadzadeh, M.(2014)。A dynamic flooding attack detection system based on different classification techniques and using SNMP MIB data。International Journal of Computer Networks and Communications Security,2(9),279-284。  new window
6.Sahi, A.、Lai, D.、Li, Y.、Diykh, M.(2017)。An efficient DDoS TCP flood attack detection and prevention system in a cloud environment。IEEE Access,5,6036-6048。  new window
7.Somani, G.、Gaur, M. S.、Sanghi, D.、Conti, M.、Buyya, R.(2017)。DDoS attacks in cloud computing: Issues, taxonomy, and future directions。Computer Communications,107,30-48。  new window
8.Zargar, S. T.、Joshi, J.、Tipper, D.(2013)。A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks。IEEE Communications Surveys & Tutorials,15(4),2046-2069。  new window
會議論文
1.Al-Hawawreh, M. S.(2017)。SYN flood attack detection in cloud environment based on TCP/IP header statistical features。The 8th IEEE International Conference on Information Technology,(會議日期: May 17, 2017)。Jordan:Al-Zaytoonah University of Jordan。236-243。  new window
其他
1.Mell, P.,Grance, T.(2011)。The NIST Definition of Cloud Computing,https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf。  new window
2.Alkasassbeh, M.,Hassanat, A. B. A.,Al-Naymat, G.,Almseidin, M.(2016)。Dataset-detecting distributed denial of service attacks using data mining techniques,https://www.researchgate.net/publication/292967044_Dataset-Detecting_Distributed_Denial_of_Service_Attacks_Using_Data_Mining_Techniques。  new window
3.Brownlee, J.(2014)。Feature selection to improve accuracy and decrease training time,https://machinelearningmastery.com/feature-selection-to-improve-accuracy-anddecrease-training-time/。  new window
4.JavaPipe(2018)。35 types of DDoS attacks explained,https://javapipe.com/ddos/blog/ddos-types/。  new window
5.TechRepublic(2018)。GitHub hit with massive 1.35 Tbps DDoS attack, could be world's largest,https://www.techrepublic.com/article/github-hit-with –massive-1-35-tbps-ddos-attack-could-be-worlds-largest/。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關書籍
 
無相關著作
 
QR Code
QRCODE