Effective Feature Selection Methods to Detect IoT DDoS Attack in 5G Core Network.
Ye-Eun KimYea-Sul KimHwankuk KimPublished in: Sensors (2022)
Keyphrases
- ddos attacks
- network services
- denial of service attacks
- peer to peer
- computer networks
- forensic analysis
- network structure
- network architecture
- dos attacks
- computer systems
- management system
- complex networks
- network traffic
- information technology
- communication networks
- social network analysis
- cloud computing
- network layer