Research on Network Attack Traffic Detection HybridAlgorithm Based on UMAP-RF.
Xiaoyu DuCheng ChengYujing WangZhijie HanPublished in: Algorithms (2022)
Keyphrases
- normal traffic
- network traffic
- ddos attacks
- traffic analysis
- anomaly detection
- network attacks
- computer networks
- denial of service attacks
- traffic data
- attack graphs
- network traffic monitoring
- worm detection
- traffic volume
- traffic patterns
- transportation networks
- traffic network
- ip addresses
- detection mechanism
- network conditions
- network management
- network layer
- internet traffic
- detection algorithm
- malicious traffic
- traffic flow
- attack detection
- ip address
- peer to peer
- mesh network
- attack graph
- network configuration
- cyber attacks
- congestion control
- network topologies
- telecommunication networks
- network resources
- detect anomalies
- intermediate nodes
- security measures
- intrusion detection system
- internet service providers
- intrusion detection
- false alarms
- network structure