Detection of DDoS Attack Using Optimized Machine Learning Technique
(eBook)
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Format
eBook
Language
English
ISBN
9798223210108
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation, 7th Edition (style guide)
Kalai Vani Y. S., & Kalai Vani Y. S.|AUTHOR. (2023). Detection of DDoS Attack Using Optimized Machine Learning Technique . MOHAMMED ABDUL SATTAR.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Kalai Vani Y. S and Kalai Vani Y. S.|AUTHOR. 2023. Detection of DDoS Attack Using Optimized Machine Learning Technique. MOHAMMED ABDUL SATTAR.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Kalai Vani Y. S and Kalai Vani Y. S.|AUTHOR. Detection of DDoS Attack Using Optimized Machine Learning Technique MOHAMMED ABDUL SATTAR, 2023.
MLA Citation, 9th Edition (style guide)Kalai Vani Y. S., and Kalai Vani Y. S.|AUTHOR. Detection of DDoS Attack Using Optimized Machine Learning Technique MOHAMMED ABDUL SATTAR, 2023.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouping Information
Grouped Work ID | 5511709a-47f2-cb6b-60de-bca3b3048366-eng |
---|---|
Full title | detection of ddos attack using optimized machine learning technique |
Author | s kalai vani y |
Grouping Category | book |
Last Update | 2024-05-14 23:01:28PM |
Last Indexed | 2024-05-21 00:24:20AM |
Hoopla Extract Information
stdClass Object ( [year] => 2023 [artist] => Kalai Vani Y. S. [fiction] => [coverImageUrl] => https://cover.hoopladigital.com/dra_9798223210108_270.jpeg [titleId] => 16182316 [isbn] => 9798223210108 [abridged] => [language] => ENGLISH [profanity] => [title] => Detection of DDoS Attack Using Optimized Machine Learning Technique [demo] => [segments] => Array ( ) [pages] => 109 [children] => [artists] => Array ( [0] => stdClass Object ( [name] => Kalai Vani Y. S. [artistFormal] => Y. S., Kalai Vani [relationship] => AUTHOR ) ) [genres] => Array ( [0] => Artificial Intelligence [1] => Computers [2] => Data Science [3] => Machine Learning ) [price] => 1.35 [id] => 16182316 [edited] => [kind] => EBOOK [active] => 1 [upc] => [synopsis] => Network security is any action an organization takes to prevent malicious use or accidental damage to the network's private data, its users or their devices. The goal of network security is to keep the network running and safe for all legitimate users.Security incident response is one key aspect of maintaining organizational security. A critical task during security incident response is detecting that an incident has occurred. Detection may occur through reports from end-users and other stakeholders in the organization, throughdetection analysis performed or it may be accomplished by using anintrusion detection system. Intrusion Detection (ID) is a challenging endeavor, requiring security practitioners to have a high level of security expertise and knowledge of their systems and organizationThe demand for the ubiquitous personal communications is driving the development of new networking techniques. Information security has now become a very important aspect of data communication as people spend a large amount of time connected to a network. To improve the security of the data being transmitted various techniques are employed. This chapter presents background, problem discussion, research challenges, objectives and thesisorganization. A denial-of-service attack overwhelms a system's resources so thatitcannot respond to service requests. A DDoS attack is also an attack on system's resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. There are different types of DoS and DDoS attacks; the most common are TCP SYN flood attack, teardrop attack, smurf attack, ping-of-death attack and botnets. [url] => https://www.hoopladigital.com/title/16182316 [pa] => [publisher] => MOHAMMED ABDUL SATTAR [purchaseModel] => INSTANT )