Open Access
MATEC Web Conf.
Volume 348, 2021
The 2nd International Network of Biomaterials and Engineering Science (INBES’2021)
Article Number 01012
Number of page(s) 8
Published online 17 November 2021
  1. Shirazi, “Evaluation of anomaly detection techniques for scada communication resilience,” IEEE Resilience Week, 2016. [Google Scholar]
  2. N. Mirai, “Mirai-botnet,” 2016. [Online]. Available: [Accessed 31 December 2019]. [Google Scholar]
  3. H. Zhou, B. Liu and D. Wang, “Design and research of urban intelligent transportation system based on the Internet of Things,” Internet of Things, pp. 572–580, 2012. [Google Scholar]
  4. S. Lim, S. Yang and Y Kim, “Controller scheduling for continued SDN operation under DDoS attacks,” Electronic Letter, pp. 1259–1261, 2015. [CrossRef] [Google Scholar]
  5. A. Buck and E. Govan, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, Vol. 18.2, 2016. [Google Scholar]
  6. P. Baldi, “Autoencoders, Unsupervised Learning, and Deep Architectures,” Proceedings of ICML works hop nuns supervised transfer learning, 2012. [Google Scholar]
  7. R. Doshi, N. Althorp and N. Feemster, “Machine Learning DDoS Detection for Consumer Internet of Things Devices,” IEEE Deep Learning and Security Workshop, 2018. [Google Scholar]
  8. Q. Yan, F. Yu and Q. Gong, “Software defined networking and Distributed denial of service attacks in cloud computipgg] environments,” IEEE Communications Survey & Tutorial, no. 18, pp. 602–622, 2016. [CrossRef] [Google Scholar]
  9. N. Z. Bawany, J. A. Shamsi and K. Salah, “DDoS Attack Detection and Mitigation Using SDN,” Arabian Journal for Science & Engineering, no. 2, pp. 1–19, 2017. [Google Scholar]
  10. B. Kang and H. Choo, “An SDN-enhanced load-balancing technique in the cloud system[J].,” Journal of Supercomputing, pp. 1–24, 2016. [Google Scholar]
  11. O. Saniya and D. M. Choo, “Distributed denial of service (DDOS)}] resilience in cloud,” Journal of Network & Computer Applications, pp. 147–165, 2016. [Google Scholar]
  12. H. Luo, Z. Chen and J. Li, “Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers[J],” IEEE Transactions on Information Forensics & Security, pp. 1801–1815, 2017. [Google Scholar]
  13. U. Dick and T. Schiffer, “Learning to control a structured-prediction decoder for detection of HTTP-layer DDOS attackers,” in Machine Learning, 2016, pp. 1–26. [Google Scholar]
  14. Z. Gao and N. Ansari, “Differentiating Malicious DDoS Atta Traffic from Normal TCP Flows by Proactive Tests[J] Communications Letters IEEE, pp. 793–795, 2006. [CrossRef] [Google Scholar]
  15. K. Briceno, A. Rurality and A. Gurov, “Detecting the Origin DDoS Attacks in OpenStack Cloud Platform Using Di Mining Techniques[M]// Internet of Things,” Smart Spaa and Next Generation Networks and Systems, 2016. [Google Scholar]
  16. N. Hoque, D. Bhattacharyya and J. Kavita, “Botnet in DDoS Attacl Trends and Challenges[J],” IEEE Communications Surveys Tutorials, pp. 1–1, 2015. [Google Scholar]
  17. A. Saeed, R. E. Overbill and T. Ridzik, “Detection of known a unknown DDOS attacks using Artificial Neural Network: Neurocomputing, pp. 385–393, 2016. [CrossRef] [Google Scholar]
  18. S. Rama nauseate, N. Geranin and A. Cents, “Modelling influence Botnet features on effectiveness of DDoS attacks[J],” Security & Communication Networks, pp. 2090–2101,2015. [Google Scholar]
  19. C. Barghini, M. J. Kavita, S. Singh and D. K. Bhattacharyya, “Anomaly based DDoS attack detection,” International Journal of Computer Applications, pp. 35–40, 2015. [Google Scholar]
  20. A. Aggarwal and A. Gupta, “Survey on data mining and IP traceback technique in DDos attack,” International Journal of Engineering and computer science, Vol. 4(6), pp. 12595–12598, 2015. [Google Scholar]
  21. G. Naima and M. Hemal Atha, “Effective approach towards intrusion detection system using data mining technique,” Egyptian Informatics Journal, Vol. 15(1), pp. 37–50, 2014. [Google Scholar]
  22. Y. A. Mahmood, “Autoencoder-based feature learning for cybersecurity applications,” International Joint Conference on Neural Networks (IJCNN), 2017. [Google Scholar]
  23. S. Yadav and S. Subramanian, “Detection of Application Layer DDoS attack by feature learning using Stacked Auto Encoder,” International Conference on Computational (ICCTICT), 2016. [Google Scholar]
  24. A. Fischer and C. Ige, “An introduction to restricted Boltzmann machines. In Libero American congress on pattern recognition,” Springer, Berlin, Heidelberg, pp. 14–36, 2012. [Google Scholar]
  25. V.G. Rydin and G. Volcano, “An expectation maximization method to estimate a rank-based,” 2017. [Google Scholar]
  26. D. Ferrierite, “Extreme Dimensionality Reduction for Network Attack Visualization with Autoencoders,” (IJCNN), 2019. [Google Scholar]
  27. I. Sharfuddin, A. H. Lashkar, S. Haka and A. Ghobadi, “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy,” International caravan conference on security (ICCST). IEEE, pp. 1–8, 2019. [Google Scholar]
  28. Y. Maidan, M. Bandana, Y. Mathur, Y. Mirsky and Shabtai, “Network based detection of iot botnet attacks using deep autoencoders,” IEEE Pervasive Computing, pp. 12–22, 17(3). [Google Scholar]
  29. C. Elkan, “Using the triangle inequality to accelerate k-means,” ICML-03, pp. 147–153, 2003. [Google Scholar]
  30. R. Bhatia, S. Benno, J. Esteban, T. V. Lakshman and J. Grogan, “Unsupervised machine learning for network-centric anomaly detection in IoT.,” in the 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.