Detection of DDoS Attack Using Optimized Machine Learning Technique
(eBook)

Book Cover
Average Rating
Published
MOHAMMED ABDUL SATTAR, 2023.
Status
Available Online

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Format
eBook
Language
English
ISBN
9798223210108

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Kalai Vani Y. S., & Kalai Vani Y. S.|AUTHOR. (2023). Detection of DDoS Attack Using Optimized Machine Learning Technique . MOHAMMED ABDUL SATTAR.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Kalai Vani Y. S and Kalai Vani Y. S.|AUTHOR. 2023. Detection of DDoS Attack Using Optimized Machine Learning Technique. MOHAMMED ABDUL SATTAR.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Kalai Vani Y. S and Kalai Vani Y. S.|AUTHOR. Detection of DDoS Attack Using Optimized Machine Learning Technique MOHAMMED ABDUL SATTAR, 2023.

MLA Citation, 9th Edition (style guide)

Kalai Vani Y. S., and Kalai Vani Y. S.|AUTHOR. Detection of DDoS Attack Using Optimized Machine Learning Technique MOHAMMED ABDUL SATTAR, 2023.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Go To Grouped Work

Grouping Information

Grouped Work ID5511709a-47f2-cb6b-60de-bca3b3048366-eng
Full titledetection of ddos attack using optimized machine learning technique
Authors kalai vani y
Grouping Categorybook
Last Update2024-05-14 23:01:28PM
Last Indexed2024-05-21 00:24:20AM

Hoopla Extract Information

stdClass Object
(
    [year] => 2023
    [artist] => Kalai Vani Y. S.
    [fiction] => 
    [coverImageUrl] => https://cover.hoopladigital.com/dra_9798223210108_270.jpeg
    [titleId] => 16182316
    [isbn] => 9798223210108
    [abridged] => 
    [language] => ENGLISH
    [profanity] => 
    [title] => Detection of DDoS Attack Using Optimized Machine Learning Technique
    [demo] => 
    [segments] => Array
        (
        )

    [pages] => 109
    [children] => 
    [artists] => Array
        (
            [0] => stdClass Object
                (
                    [name] => Kalai Vani Y. S.
                    [artistFormal] => Y. S., Kalai Vani
                    [relationship] => AUTHOR
                )

        )

    [genres] => Array
        (
            [0] => Artificial Intelligence
            [1] => Computers
            [2] => Data Science
            [3] => Machine Learning
        )

    [price] => 1.35
    [id] => 16182316
    [edited] => 
    [kind] => EBOOK
    [active] => 1
    [upc] => 
    [synopsis] => Network  security  is  any  action  an  organization  takes  to  prevent malicious use or accidental damage to the network's private data, its users or their devices. The goal of network security is to keep the network running and safe for all legitimate users.Security  incident  response  is  one  key  aspect  of  maintaining organizational security. A critical task during security incident response is detecting that an incident has occurred. Detection may occur through reports from end-users and other stakeholders in the organization, throughdetection analysis performed or it may be accomplished by using anintrusion detection system. Intrusion Detection (ID) is a challenging endeavor, requiring security practitioners to have a high level of security expertise and knowledge of their systems and organizationThe demand for the ubiquitous personal communications is driving the development of new networking techniques. Information security  has now become a very important aspect of data communication as people spend a large amount of time connected to a network. To improve the security of the data being transmitted various techniques are employed. This chapter presents background, problem discussion, research challenges, objectives and thesisorganization. A denial-of-service attack overwhelms a system's resources so thatitcannot respond to service requests. A DDoS attack is also an attack on system's resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. There are different types of DoS and DDoS attacks; the most common are TCP SYN flood attack, teardrop attack, smurf attack, ping-of-death attack and botnets.
    [url] => https://www.hoopladigital.com/title/16182316
    [pa] => 
    [publisher] => MOHAMMED ABDUL SATTAR
    [purchaseModel] => INSTANT
)