The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment.
Hossein AbbasiNaser Ezzati-JivanMartine BellaïcheChamseddine TalhiMichel R. DagenaisPublished in: J. Hardw. Syst. Secur. (2021)
Keyphrases
- anomaly detection
- ddos attacks
- intrusion detection
- detecting anomalous
- network intrusion detection
- normal traffic
- detect anomalies
- detecting anomalies
- network traffic
- unsupervised learning
- computer security
- anomalous behavior
- network anomaly detection
- behavior analysis
- intrusion detection system
- normal behavior
- one class support vector machines
- social networks
- misuse detection
- malware detection
- ip address
- network security