Please use this identifier to cite or link to this item: http://dspace.aiub.edu:8080/jspui/handle/123456789/2648
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSahosh, Zerin Hasan-
dc.contributor.authorFaheem, Azraf-
dc.contributor.authorTuba, Marzana Bintay-
dc.contributor.authorAhmed, Md. Istiaq-
dc.contributor.authorTasnim, Syeda Anika-
dc.date.accessioned2025-03-04T03:54:21Z-
dc.date.available2025-03-04T03:54:21Z-
dc.date.issued2024-03-09-
dc.identifier.issn2785-8901-
dc.identifier.urihttp://dspace.aiub.edu:8080/jspui/handle/123456789/2648-
dc.description.abstractThe rapid growth of the internet and the increasing reliance on digital infrastructures have posed significant challenges to cybersecurity. Among the other variants of attacks, Distributed Denial of Service (DDoS) attacks have emerged as one of the most destructive and common threats. These attacks disrupt or slow down network services by overwhelming the network infrastructure with a massive volume of malicious traffic. To effectively identify and mitigate DDoS attacks, machine learning techniques have been extensively employed in intrusion detection systems. Machine learning approaches offer the advantage of automating the detection process by learning patterns and characteristics of DDoS attacks from historical data. Researchers have explored various machine learning algorithms such as K-Nearest Neighbours (KNN), Support Vector Machine (SVM), Random Forest (RF), and Naïve Bayes to classify and detect DDoS attacks. These algorithms leverage features extracted from network traffic data, including packet size, packet delay patterns, and traffic behaviour, to differentiate between normal and malicious traffic.en_US
dc.language.isoen_USen_US
dc.publisherPenteract Technologyen_US
dc.titleA Comparative Review on DDoS Attack Detection Using Machine Learning Techniquesen_US
dc.typeArticleen_US
Appears in Collections:Publications: Journals

Files in This Item:
File Description SizeFormat 
A Comparative Review on DDoS Attack Detection Using Machine Learning Techniques - Dspace.docx4.65 MBMicrosoft Word XMLView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.