Denial of Service Attack Analysis Using Machine Learning Techniques

Sohail Hussain, R. Karthikeyan, S. Ramamoorthi, I. Arafat, S. M. Gani
{"title":"Denial of Service Attack Analysis Using Machine Learning Techniques","authors":"Sohail Hussain, R. Karthikeyan, S. Ramamoorthi, I. Arafat, S. M. Gani","doi":"10.1109/ICECAA58104.2023.10212215","DOIUrl":null,"url":null,"abstract":"Internet helps the users to develop their skills as well as for doing their day to day activities. Regular work of the users is generally done via online. If people want to do money based transaction or sending important message to their neighbor, they use online network. This can be used and interfere by the attackers. Many attackers utilize the tools to disturb the authorized user job. Major attack utilized by the attacker to disturb the service get by the authorized users is denial of service. It becomes major kind of procedure done by the intruder to take control over system or to down the server. In this paper we analyze the DoS attack including its distributed version. Impacts of DoS are also discussed. Based on the survey and analysis we suggest the model for handling the DoS attack dynamically is also mentioned.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA58104.2023.10212215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Internet helps the users to develop their skills as well as for doing their day to day activities. Regular work of the users is generally done via online. If people want to do money based transaction or sending important message to their neighbor, they use online network. This can be used and interfere by the attackers. Many attackers utilize the tools to disturb the authorized user job. Major attack utilized by the attacker to disturb the service get by the authorized users is denial of service. It becomes major kind of procedure done by the intruder to take control over system or to down the server. In this paper we analyze the DoS attack including its distributed version. Impacts of DoS are also discussed. Based on the survey and analysis we suggest the model for handling the DoS attack dynamically is also mentioned.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用机器学习技术的拒绝服务攻击分析
互联网帮助用户发展他们的技能,以及做他们的日常活动。用户的日常工作一般都是通过网络完成的。如果人们想要进行基于金钱的交易或向邻居发送重要信息,他们使用在线网络。这可以被攻击者使用和干扰。许多攻击者利用这些工具来干扰授权用户的作业。攻击者干扰授权用户获得服务的主要攻击方式是拒绝服务。入侵者采取的主要手段是控制系统或使服务器瘫痪。本文分析了DoS攻击及其分布式版本。还讨论了DoS的影响。在调查分析的基础上,提出了动态处理DoS攻击的模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Deep Learning based Sentiment Analysis on Images A Comprehensive Analysis on Unconstraint Video Analysis Using Deep Learning Approaches An Intelligent Parking Lot Management System Based on Real-Time License Plate Recognition BLIP-NLP Model for Sentiment Analysis Botnet Attack Detection in IoT Networks using CNN and LSTM
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1