期刊论文详细信息
Journal of Computer Science
REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS | Science Publications
Mehdi Ebady Manaa1  Wesam Bhaya1 
关键词: Network Security;    Distributed Denial of Service (DDoS);    Data Mining;   
DOI  :  10.3844/jcssp.2014.2037.2046
学科分类:计算机科学(综合)
来源: Science Publications
PDF
【 摘 要 】

Distributed Denial of Service attacks (DDoS) overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS) for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO201911300085261ZK.pdf 186KB PDF download
  文献评价指标  
  下载次数:7次 浏览次数:12次