Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
PAR Kumar, S Selvakumar - Computer Communications, 2013 - Elsevier
… a base classifier for our research as Mamdani type ANFIS is … were overwhelmed by moderate
size DDoS attack. To avoid … ’ feature has been used to identify the incomplete TCP 3 way …
size DDoS attack. To avoid … ’ feature has been used to identify the incomplete TCP 3 way …
An intrusion detection method to detect denial of service attacks using error-correcting output codes and adaptive neuro-fuzzy inference
Z Majidian, S TaghipourEivazi, B Arasteh… - Computers and Electrical …, 2023 - Elsevier
… to prevent an attack but only to detect, identify the type and … been used in this research to
detect DoS attacks. This hybrid model … Therefore, the length of each particle or the number of …
detect DoS attacks. This hybrid model … Therefore, the length of each particle or the number of …
[PDF][PDF] A neuro-fuzzy system to detect IPv6 router alert option DoS packets.
S Abdulla - Int. Arab J. Inf. Technol., 2020 - ccis2k.org
… more research particularly in this crucial type of DoS attacks … degree of malicious actions
has showed that this research area demands for new detection mechanisms. One of possible …
has showed that this research area demands for new detection mechanisms. One of possible …
An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment
R SaiSindhuTheja, GK Shyam - Applied Soft Computing, 2021 - Elsevier
… feed-forward neural networks, neuro-fuzzy classifiers, SVM, and … detection system, which
focuses on our research work. … After the initialization, we find fitness for the initial solution and …
focuses on our research work. … After the initialization, we find fitness for the initial solution and …
Neuro-fuzzy based intrusion detection system for wireless sensor network
… study we design robust and efficient AIDS which use fuzzy … types of DoS attacks like Sybil
attack [13], Black hole attack etc… node from Table 4 and calculate the packet drop deviation of …
attack [13], Black hole attack etc… node from Table 4 and calculate the packet drop deviation of …
[PDF][PDF] EFFICIENT DETECTION OF DOS ATTACK USING FUZZY ANN
… DDoS attacks by using attack proxies to identify the attacker. … the prescribed goals of this
research. There has been a large … this paper leverages the Neuro-Fuzzy platform for expediting …
research. There has been a large … this paper leverages the Neuro-Fuzzy platform for expediting …
Diagnosis of distributed denial of service attacks using the combination method of Fuzzy Neural Network and evolutionary algorithm
S Mahmoudpour, SJ Mirabedini - Indian Journal of Science and …, 2015 - ischolar.sscldl.in
… and to determine the optimal parameters use the differential … level, threat and consequences
of this attack, according to … an ensemble of adaptive and hybrid neuro-fuzzy systems. …
of this attack, according to … an ensemble of adaptive and hybrid neuro-fuzzy systems. …
Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
… domain to identify DDoS attacks. This study explores different types of DDoS attacks and …
faster-scaled conjugate gradient and Jang’s Neuro-fuzzy. In the experiments conducted in …
faster-scaled conjugate gradient and Jang’s Neuro-fuzzy. In the experiments conducted in …
Attack detection in internet of things using software defined network and fuzzy neural network
… In this research, an Adaptive Neuro-Fuzzy Inference System (… • This research proposed an
integrated SDN-IoT architecture … system detects the DDoS attack with the highest accuracy. …
integrated SDN-IoT architecture … system detects the DDoS attack with the highest accuracy. …
ABAP: Anchor node based DDoS attack detection using adaptive neuro-fuzzy inference system
PJ Beslin Pajila, E Golden Julie… - Wireless Personal …, 2023 - Springer
… to identify the DoS attacks. The first process is extraction of … area of size 1000 * 1000 m and
the communication range is 300 m. The … This research does not involve any human or animal …
the communication range is 300 m. The … This research does not involve any human or animal …