Sign in

A HMM-R Approach to Detect L-DDoS Attack Adaptively on SDN Controller.

Wentao WangXuan KeLingxia Wang
Published in: Future Internet (2018)
Keyphrases
  • ddos attacks
  • hidden markov models
  • dos attacks
  • control system
  • denial of service attacks
  • control parameters
  • speech recognition
  • forensic analysis
  • normal traffic
  • data mining
  • anomaly detection