Dergi makalesi Açık Erişim

Distributed denial of service attack detection using autoencoder and deep neural networks

Catak, Ferhat Ozgur; Mustacoglu, Ahmet Fatih


MARC21 XML

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Distributed denial of service attack detection using autoencoder and deep neural networks</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="p">JOURNAL OF INTELLIGENT &amp; FUZZY SYSTEMS</subfield>
    <subfield code="v">37</subfield>
    <subfield code="n">3</subfield>
    <subfield code="c">3969-3979</subfield>
  </datafield>
  <controlfield tag="001">99831</controlfield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-tubitak-adresli-yayinlar</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">Today, many companies are faced with the huge network traffics mainly consisting of the various type of network attacks due to the increased usage of the botnet, fuzzier, shellcode or network related vulnerabilities. These types of attacks are having a negative impact on the organization because they block the day-to-day operations. By using the classification models, the attacks could be identified and separated earlier. The Distributed Denial of Service Attacks (DDoS) primarily focus on preventing or reducing the availability of a service to innocent users. In this research, we focused primarily on the classification of network traffics based on the deep learning methods and technologies for network flow models. In order to increase the classification performance of a model that is based on the deep neural networks has been used. The model used in this research for the classification of network traffics evaluated and the related metrics showing the classification performance have been depicted in the figures and tables. As the results indicate, the proposed model can perform well enough for detecting DDoS attacks through deep learning technologies.</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="2">opendefinition.org</subfield>
    <subfield code="a">cc-by</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Istanbul Sehir Univ, Cyber Secur Engn, Istanbul, Turkey</subfield>
    <subfield code="a">Mustacoglu, Ahmet Fatih</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="b">article</subfield>
    <subfield code="a">publication</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">TUBITAK BILGEM Cyber Secur Inst, TR-41400 Kocaeli, Turkey</subfield>
    <subfield code="a">Catak, Ferhat Ozgur</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2019-01-01</subfield>
  </datafield>
  <controlfield tag="005">20210316141756.0</controlfield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="o">oai:zenodo.org:99831</subfield>
    <subfield code="p">user-tubitak-adresli-yayinlar</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="z">md5:c5aa6c91847c6f5aea4a591993ec7778</subfield>
    <subfield code="s">183</subfield>
    <subfield code="u">https://aperta.ulakbim.gov.trrecord/99831/files/bib-087fbebf-f8ed-44ce-b4dd-6af10c5aee58.txt</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">http://www.opendefinition.org/licenses/cc-by</subfield>
    <subfield code="a">Creative Commons Attribution</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.3233/JIFS-190159</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
</record>
24
6
görüntülenme
indirilme
Görüntülenme 24
İndirme 6
Veri hacmi 1.1 kB
Tekil görüntülenme 24
Tekil indirme 6

Alıntı yap