• No results found

Detecting Flooding Attacks Using Power Divergence

N/A
N/A
Protected

Academic year: 2021

Share "Detecting Flooding Attacks Using Power Divergence"

Copied!
13
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 2 illustrates the number of SYN flooding attacks. These attacks as described before are generated 9 times for duration  of 10 minutes for every 30 minutes
Fig. 3 and Fig. 6 show the variation of the total number of packets (TCP, UDP and ICMP) before and after the SYN flooding  attacks
Fig. 12 shows that for      = 1.5, the dynamic threshold detects all the 9 attacks that have been generated by Power Divergence
Fig. 14 and Fig. 13 show the receiver operating characteristic (ROC) curves for the Power Divergence algorithm for varying  attack intensity, attack duration and normal traffic load

References

Related documents

In this thesis, we extend Hongning Wang’s work [1] of solving Latent As- pect Rating Analysis problem. We compute restaurants aspect rating by aggregating aspect rating of reviews

Unfortunately not every vertex-weighted plane triangulated graph admits a rectangular cartogram, even if we ignore the vertex weights and concentrate only on the correct

The model contains three deep neural networks (DNNs), i) a mutation encoder pre-trained using a large pan-cancer dataset (The Cancer Genome Atlas; TCGA) to abstract core

Different company departments often use dif- ferent programmed equipment that have their own data sets and the aim of the enterprise activity integra- tion is to join all

Variabel bebas dalam penelitian ini adalah rasio Kinerja keuangan , Good corporate governance dan corporate social responsibility , dan yang menjadi variabel

The einstein problem : does there exist a single tile which can only tile the plane aperiodically?.. The

The objective of this study was therefore to compare the behavior of mean velocity (MV), pacing strategy, heart rate (HR) and rating of perceived exertion (RPE) during