Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks.
Hsiao-Chung LinPing WangWen-Hui LinPublished in: Comput. (2019)
Keyphrases
- ddos attacks
- defense mechanisms
- denial of service attacks
- forensic analysis
- dos attacks
- network services
- intrusion detection
- network security
- application layer
- ip address
- information security
- particle swarm optimization
- countermeasures
- supply chain
- data sources
- network management
- security issues
- security mechanisms
- data mining
- computer networks
- anomaly detection
- computer systems
- data mining techniques
- social networks