{"title":"基于时间序列相似度的DDoS flood攻击检测","authors":"Fatma A. Hussain, D. Nashat","doi":"10.21608/aunj.2022.129373.1004","DOIUrl":null,"url":null,"abstract":"Nobody can deny that network-based computer systems have become an essential part of our daily life especially after the COVID-2019 pandemic. These systems are extremely important in our personal and professional lives, especially now that people all around the world are working, studying, shopping, and having fun online in unprecedented numbers. On the other hand, the rise in attacks has paralleled the rapid advancement of network connectivity and service accessible technologies.","PeriodicalId":8568,"journal":{"name":"Assiut University Journal of Multidisciplinary Scientific Research","volume":"12 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Time Series Similarity for Detecting DDoS Flooding Attack\",\"authors\":\"Fatma A. Hussain, D. Nashat\",\"doi\":\"10.21608/aunj.2022.129373.1004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nobody can deny that network-based computer systems have become an essential part of our daily life especially after the COVID-2019 pandemic. These systems are extremely important in our personal and professional lives, especially now that people all around the world are working, studying, shopping, and having fun online in unprecedented numbers. On the other hand, the rise in attacks has paralleled the rapid advancement of network connectivity and service accessible technologies.\",\"PeriodicalId\":8568,\"journal\":{\"name\":\"Assiut University Journal of Multidisciplinary Scientific Research\",\"volume\":\"12 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Assiut University Journal of Multidisciplinary Scientific Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21608/aunj.2022.129373.1004\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Assiut University Journal of Multidisciplinary Scientific Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/aunj.2022.129373.1004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Time Series Similarity for Detecting DDoS Flooding Attack
Nobody can deny that network-based computer systems have become an essential part of our daily life especially after the COVID-2019 pandemic. These systems are extremely important in our personal and professional lives, especially now that people all around the world are working, studying, shopping, and having fun online in unprecedented numbers. On the other hand, the rise in attacks has paralleled the rapid advancement of network connectivity and service accessible technologies.