5/22/2023 0 Comments Anormaly detection ddosAnomaly detection methods in computer networks are based on statistical, soft computing, data mining, machine learning, and data stream algorithms. Some aspects such as attacks with low traffic rates, losing the sequential anomaly durations, and the large volume of analysis samples prolong the detection process. DDoS attacks are difficult to be detected or prevented and many researchers have focused on them recently. The attack detection systems for non-distributed attacks find a source node with large number of sending packets. Distributed Denial-of-Service (DDoS) attack is one of the most common and effective type of attacks aiming to deny or weaken the service providing of its victim(s).
0 Comments
Leave a Reply. |