光明正大 发表于 2025-3-25 03:20:52
http://reply.papertrans.cn/25/2420/241946/241946_21.png抛媚眼 发表于 2025-3-25 11:30:49
978-3-030-37351-1Springer Nature Switzerland AG 2019Protein 发表于 2025-3-25 14:54:58
IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDNble IoT devices are exploited to constitute botnet by many attackers, which forms a serious problem for network security. To solve it, we propose a novel detection and mitigation mechanism. In our method, we use Software Defined Networking (SDN), a promising network architecture, for dropping malici贸易 发表于 2025-3-25 19:27:06
http://reply.papertrans.cn/25/2420/241946/241946_24.pngAWRY 发表于 2025-3-25 21:07:34
http://reply.papertrans.cn/25/2420/241946/241946_25.pngobeisance 发表于 2025-3-26 01:35:06
DDoS Attack Detection Method Based on V-Support Vector Machinecult to detect the current detection methods. This paper proposes a DDoS attack detection method based on V-Support Vector Machine (SVM). This method defines a nine-tuple network service association feature to extract the feature of the network flow, then normalizes the feature data and reduces the摇晃 发表于 2025-3-26 05:41:11
DDOS Multivariate Information Fusion Model Based on Hierarchical Representation Learning(HRM) based on hierarchical representation learning network and a FlowMerge algorithm based on three network flow merging modes are proposed. Firstly, the network traffic is transformed into triples, and the dimensionality reduction of Tsne algorithm is used to transform it into network IP topologyatrophy 发表于 2025-3-26 09:58:24
http://reply.papertrans.cn/25/2420/241946/241946_28.pngmechanism 发表于 2025-3-26 15:39:01
http://reply.papertrans.cn/25/2420/241946/241946_29.pngKeshan-disease 发表于 2025-3-26 16:54:35
http://reply.papertrans.cn/25/2420/241946/241946_30.png