Security Analysis of Distributed Denial of Service Attacks Using Machine Learning a Survey
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Denial of service attack is the major problem in cyber network. DoS/DDoS attacks make the system performance slow. This paper discusses about DoS/DDoS attack detection algorithm and its various versions used for providing the security to the system. Each algorithm has many disadvantages like long training time, high computational cost, and adjustment of weight. Many researchers have also proposed hybrid technique with evolutionary algorithm to improve the performance of cyber system.
Authors and Affiliations
Sunita . , Abhishek Kajal
A Review on the Effect of Organic and Chemical Fertilizers on Plants
The industrial revolution followed by green revolution caused an increase in yield per unit area in crop production, but they also increased the use of synthetic fertilizers in agriculture. Intensive inorganic fertilize...
Energy Efficient Synchronization Scheme Using Heterogeneity with Mobile Sink in WSN
The energy of the sensor nodes in the Wireless Sensor Networks (WSNs) is a limited resource and causes the fluctuation in the lifetime of the network. Also, the throughput and delay of the network depend on how long the...
Increasing Individual Interest for Participating in Social Activity or Group
Recent review demonstrates that a man will consolidate a social get advancement if the action is fascinating, and if a couple accomplices too join the improvement as mates. The sythesis has demonstrated that the interes...
A Systematic Approach For Storage Free Smart Energy Management With Frequency Control In Hybrid AC Micro Grid System
This paper provides a systematic coordinated control scheme for energy management in hybrid photo voltaic(PV), fuel cell (FC) and diesel engine generator (DEG) in an AC micro grid without any storage like batteries or f...
Multi-level Security: Data Sharing Using Cryptography and Steganography in Cloud Computing
In cloud computing, sharing of data is considered as a challenging security problem. The sharing of the user’s critical data on a third party cloud server does not guarantee the promised level of security and there is a...