Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
PAR Kumar, S Selvakumar - Computer Communications, 2013 - Elsevier
… a base classifier for our research as Mamdani type ANFIS is … were overwhelmed by moderate
size DDoS attack. To avoid … ’ feature has been used to identify the incomplete TCP 3 way …
size DDoS attack. To avoid … ’ feature has been used to identify the incomplete TCP 3 way …
[PDF][PDF] A neuro-fuzzy system to detect IPv6 router alert option DoS packets.
S Abdulla - Int. Arab J. Inf. Technol., 2020 - academia.edu
… more research particularly in this crucial type of DoS attacks … degree of malicious actions
has showed that this research area demands for new detection mechanisms. One of possible …
has showed that this research area demands for new detection mechanisms. One of possible …
An intrusion detection method to detect denial of service attacks using error-correcting output codes and adaptive neuro-fuzzy inference
Z Majidian, S TaghipourEivazi, B Arasteh… - Computers and Electrical …, 2023 - Elsevier
… This research, is an effort to improve the accuracy of DoS attacks detection, compared to
previous … task using ECOC based hybrid classifiers is one of the main objectives of the research. …
previous … task using ECOC based hybrid classifiers is one of the main objectives of the research. …
Improving network resilience against DDoS attacks: A fuzzy TOPSIS-based quantitative assessment approach
SH Almotiri - Heliyon, 2024 - cell.com
… a high-level overview of the research materials and methods … The current study attempts to
close this gap by applying a … can find more effective solutions to the problem of DDoS attacks. …
close this gap by applying a … can find more effective solutions to the problem of DDoS attacks. …
Neuro-fuzzy based intrusion detection system for wireless sensor network
… study we design robust and efficient AIDS which use fuzzy … types of DoS attacks like Sybil
attack [13], Black hole attack etc… node from Table 4 and calculate the packet drop deviation of …
attack [13], Black hole attack etc… node from Table 4 and calculate the packet drop deviation of …
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
… algorithms are investigated in this work. A set of parallel … Subtractive clustering has been
used to determine the number of rules … level of detection performance only for DoS and PROBE …
used to determine the number of rules … level of detection performance only for DoS and PROBE …
An intrusion detection system using exponential henry gas solubility optimization based deep neuro fuzzy network in MANET
SB Ninu - Engineering Applications of Artificial Intelligence, 2023 - Elsevier
… security because it makes it possible to identify malicious … The following two steps are
performed in this research. The … into account DDoS attacks, black hole attacks, and attacks without …
performed in this research. The … into account DDoS attacks, black hole attacks, and attacks without …
PHY/MAC layer attack detection system using neuro-fuzzy algorithm for IoT network
S Rahman, S Al Mamun, MU Ahmed… - 2016 International …, 2016 - ieeexplore.ieee.org
… In this section we present an example for conceptual study. … to identify whether the considering
loT network is under attack or … network in under DoS attack. Table I deals with three major …
loT network is under attack or … network in under DoS attack. Table I deals with three major …
Electric Vehicles CAN Bus Cyber Attacks Detection Using Adaptive Neuro Fuzzy Inference System
… DLC determines the byte length of the data field. … In this paper, the DOS attack objective
is to delay or obstruct the … The aim of this research was to develop and propose an EV CAN …
is to delay or obstruct the … The aim of this research was to develop and propose an EV CAN …
Attack detection in internet of things using software defined network and fuzzy neural network
… In this research, an Adaptive Neuro-Fuzzy Inference System (… • This research proposed an
integrated SDN-IoT architecture … system detects the DDoS attack with the highest accuracy. …
integrated SDN-IoT architecture … system detects the DDoS attack with the highest accuracy. …