Feature selection techniques cloud DDOS attack detection

0Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The ongoing progression of Cloud Computing, it gives different services to together hierarchical as well as singular users, for example, shared computing resources, storage, networking and so on interest. The most well-known sort of attack on Cloud-computing is Distributed Denial of Service-(DDoS) Attack. DDoS attack is an bother which makes resources inaccessible to the client by trading off enormous no of system called bots. This paper proposes systems to create an ideal network traffic feature set for network intrusion detection. The proposed system shows that a reliable set of features are chosen for a given dataset. The outcomes demonstrate that the proposed procedure yields a set of features that, when utilized for network traffic classification, yields low quantities of false alarms.

Cite

CITATION STYLE

APA

Emerald Jenifer Mary, S., & Nalini, C. (2019). Feature selection techniques cloud DDOS attack detection. International Journal of Innovative Technology and Exploring Engineering, 8(12), 1257–1260. https://doi.org/10.35940/ijitee.L3908.1081219

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free