|
[1] J. Mirkovic and P. Reiher, " A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, 2004. [2] Z. He, T. Zhang, and R.B. Lee, " Machine Learning Based DDoS Attack Detection from Source Side in Cloud," Proceedings of the IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), July 2017. [3] S.S. Mohammed, R. Hussain, B. Bimaganbetov, and J. Lee, " A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network," Proceedings of the 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct. 2018. [4] Y. Liu, M. Dong, K. Ota, J. Li, and J. Wu, " Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks," Proceedings of the IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Sept. 2018. [5] M. Zekri, S.E. Kafhali, N. Aboutabit, and Y. Saadi, " DDoS Attack Detection Using Machine Learning Techniques in Cloud Computing Environments," Proceedings of the 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), Oct. 2017. [6] R. Doshi, N. Apthorpe, and N. Feamster, " Machine Learning DDoS Detection for Consumer Internet of Things Devices," Proceedings of the IEEE Security and Privacy Workshops (SPW), May 2018. [7] Q. Yan, W. Huang, X. Luo, Q. Gong, and F. Richard Yu, " A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things," IEEE Communications Magazine, Feb. 2018. [8] E. Aras, G.S. Ramachandran, P. Lawrence, and D. Hughes, " Exploring the Security Vulnerabilities of LoRa," Proceedings of the 3rd IEEE International Conference on Cybernetics (CYBCONF), June 2017. [9] S. Dowling, M. Schukat, and H. Melvin, " A ZigBee Honeypot to assess IoT Cyberattack Behaviour," Proceedings of the 28th Irish Signals and Systems Conference (ISSC), June 2017. [10] A. Mishra and A. Dixit, " Resolving Threats in IoT: ID Spoofing to DDoS," Proceedings of the 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), July 2018. [11] S.S. Hassan, S.D. Bibon, M.S. Hossain, and M. Atiquzzaman, " Security Threats in Bluetooth Technology," Computers & Security Volume 74, May 2018. [12] W. Albazrqaoe, J. Huang, and G. Xing, " Practical Bluetooth Traffic Sniffing: Systems and Privacy Implications," Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, June 2016. [13] K. Chen, A. R. Junuthula, I. K. Siddhrau, Y. Xu, and H. J. Chao, " SDNShield: Towards More Comprehensive Defense against DDoS Attacks on SDN Control Plane," Proceedings of the IEEE Conference on Communications and Network Security (CNS), Feb. 2017. [14] K. Kalkan, L. Altay, G. Gür, and F. Alagöz, " JESS: Joint Entropy-Based DDoS Defense Scheme in SDN," IEEE Journal on Selected Areas in Communications, Sep. 2018. [15] D. Yin, L. Zhang, and K. Yang, " A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework, " IEEE Access, Apr. 2018. [16] P. MohanaPriya and S. Mercy Shalinie, " Restricted Boltzmann Machine Based Detection System for DDoS Attack in Software Defined Networks," Proceedings of the Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), Oct. 2017. [17] L. Yang and H. Zhao, " DDoS Attack Identification and Defense Using SDN Based on Machine Learning Method," Proceedings of the 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN), Feb. 2019. [18] Y. Feng, H. Akiyama, L. Lu, and K. Sakurai, " Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks," Proceedings of the IEEE 16th Intl Conf on DASC/PiCom/DataCom/CyberSciTech, Oct. 2018. [19] V. Selis and A. Marshall, " A Classification-Based Algorithm to Detect Forged Embedded Machines in IoT Environments," IEEE Systems Journal, May 2018. [20] M. Roopak, G. Y. Tian, and J. Chambers, " Deep Learning Models for Cyber Security in IoT Networks," Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Mar. 2019. [21] G. Kaur, " A Novel Distributed Machine Learning Framework for Semi-Supervised Detection of Botnet Attacks," Proceedings of the Eleventh International Conference on Contemporary Computing (IC3), Nov. 2018. [22] K. Gurulakshmi and A. Nesarani, " Analysis of IoT Bots Against DDOS Attack Using Machine Learning Algorithm," Proceedings of the 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Dec. 2018. [23] L. Dhanabal1 and Dr. S.P. Shantharajah, " A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms," International Journal of Advanced Research in Computer and Communication Engineering, June 2015. [24] " Dataset," http://smartcity.cs.nthu.edu.tw/dataset/download.php, 2019. [25] scikit-learn: https://scikit-learn.org/stable/ |