DDoS Classification using Combined Techniques
Now-a-days, the attacker's favourite is to disrupt a network system. An attacker has the capability to generate various types of DDoS attacks simultaneously, including the Smurf attack, ICMP flood, UDP flood, and TCP SYN flood. This DDoS issue encouraged the design of a classification techn...
Saved in:
Main Authors: | Mohd Yusof, Mohd Azahari, Mohd Safar, Noor Zuraidin, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Jofri, Muhamad Hanif, Mohamed, Juliana, Omar, Abdul Halim, Bahrudin, Ida Aryanie, Mohamed Ali @ Md Hani, Mohd Hatta |
---|---|
Format: | Article |
Language: | English |
Published: |
ijacsa
2024
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/10936/1/J17424_0b14450bdb1b1d7104fe305c68705989.pdf http://eprints.uthm.edu.my/10936/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
DDoS mitigation: a review of content delivery network and its DDoS defense techniques
by: Imthiyas, Mohammed, et al.
Published: (2020) -
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023) -
A review of DDoS attacks and defenses in IoT.
by: Mohd. Sam, Suriani, et al.
Published: (2022) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)