Login / Signup
Use of access characteristics to distinguish legitimate user traffic from DDoS attack traffic.
Kentaro Aburada
Yuki Arikawa
Shotaro Usuzaki
Hisaaki Yamaba
Tetsuro Katayama
Mirang Park
Naonobu Okazaki
Published in:
Artif. Life Robotics (2019)
Keyphrases
</>
ddos attacks
dos attacks
network layer
network traffic
normal traffic
traffic flow
denial of service attacks
traffic patterns
ip address
application layer
access control
road network
data mining
traffic data
distributed denial of service