Detecting Linking Flooding Attacks using Deep Convolution Network.
Yen-Hung ChenPi-Tzong JanChing-Neng LaiChunWei HuangChih-Han ChangYo-Cih HuangPublished in: ICCMB (2020)
Keyphrases
- traffic analysis
- network intrusion detection systems
- network intrusion
- security threats
- peer to peer
- buffer overflow
- denial of service attacks
- network structure
- countermeasures
- computer networks
- mobile networks
- watermarking scheme
- security risks
- network traffic
- network anomaly detection
- image processing
- intrusion prevention