使用机器学习技术的拒绝服务攻击分析

Sohail Hussain, R. Karthikeyan, S. Ramamoorthi, I. Arafat, S. M. Gani
{"title":"使用机器学习技术的拒绝服务攻击分析","authors":"Sohail Hussain, R. Karthikeyan, S. Ramamoorthi, I. Arafat, S. M. Gani","doi":"10.1109/ICECAA58104.2023.10212215","DOIUrl":null,"url":null,"abstract":"Internet helps the users to develop their skills as well as for doing their day to day activities. Regular work of the users is generally done via online. If people want to do money based transaction or sending important message to their neighbor, they use online network. This can be used and interfere by the attackers. Many attackers utilize the tools to disturb the authorized user job. Major attack utilized by the attacker to disturb the service get by the authorized users is denial of service. It becomes major kind of procedure done by the intruder to take control over system or to down the server. In this paper we analyze the DoS attack including its distributed version. Impacts of DoS are also discussed. Based on the survey and analysis we suggest the model for handling the DoS attack dynamically is also mentioned.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Denial of Service Attack Analysis Using Machine Learning Techniques\",\"authors\":\"Sohail Hussain, R. Karthikeyan, S. Ramamoorthi, I. Arafat, S. M. Gani\",\"doi\":\"10.1109/ICECAA58104.2023.10212215\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet helps the users to develop their skills as well as for doing their day to day activities. Regular work of the users is generally done via online. If people want to do money based transaction or sending important message to their neighbor, they use online network. This can be used and interfere by the attackers. Many attackers utilize the tools to disturb the authorized user job. Major attack utilized by the attacker to disturb the service get by the authorized users is denial of service. It becomes major kind of procedure done by the intruder to take control over system or to down the server. In this paper we analyze the DoS attack including its distributed version. Impacts of DoS are also discussed. Based on the survey and analysis we suggest the model for handling the DoS attack dynamically is also mentioned.\",\"PeriodicalId\":114624,\"journal\":{\"name\":\"2023 2nd International Conference on Edge Computing and Applications (ICECAA)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Edge Computing and Applications (ICECAA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECAA58104.2023.10212215\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECAA58104.2023.10212215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

互联网帮助用户发展他们的技能,以及做他们的日常活动。用户的日常工作一般都是通过网络完成的。如果人们想要进行基于金钱的交易或向邻居发送重要信息,他们使用在线网络。这可以被攻击者使用和干扰。许多攻击者利用这些工具来干扰授权用户的作业。攻击者干扰授权用户获得服务的主要攻击方式是拒绝服务。入侵者采取的主要手段是控制系统或使服务器瘫痪。本文分析了DoS攻击及其分布式版本。还讨论了DoS的影响。在调查分析的基础上,提出了动态处理DoS攻击的模型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Denial of Service Attack Analysis Using Machine Learning Techniques
Internet helps the users to develop their skills as well as for doing their day to day activities. Regular work of the users is generally done via online. If people want to do money based transaction or sending important message to their neighbor, they use online network. This can be used and interfere by the attackers. Many attackers utilize the tools to disturb the authorized user job. Major attack utilized by the attacker to disturb the service get by the authorized users is denial of service. It becomes major kind of procedure done by the intruder to take control over system or to down the server. In this paper we analyze the DoS attack including its distributed version. Impacts of DoS are also discussed. Based on the survey and analysis we suggest the model for handling the DoS attack dynamically is also mentioned.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信