References
- F. Laghrissi, S. Douzi, K. Douzi, and B. Hssina, “Intrusion detection systems using long short-term memory (LSTM),” Journal of Big Data, vol. 8, no. 1, 2021.
- “The world’s most valuable resource is no longer oil, but data,” The Economist, [Accessed: 05-Mar-2023].
- M. Macas and C. Wu, “Review: Deep learning methods for cyber security and intrusion detection systems,” in 2020 IEEE Latin-American Conference on Communications (LATINCOM).
- A. Rudskoy, A. Borovkov, P. Romanov, and O. Kolosova, “Reducing global risks in the process of transition to the digital economy,” IOP Conference Series: Materials Science and Engineering, vol. 497, p. 012088, 2019.
- A. Kushairi, R. Singh, and M. Ong-Abdullah, “The oil palm industry in malaysia: Thriving with transformative technologies,” Journal of Oil Palm Research, vol. 29, no. 4, pp. 431–439, 2017.
- A. Alsirhani, S. Sampalli, and P. Bodorik, “Ddos attack detection system: Utilizing classification algorithms with apache spark,” in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018.
- O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, “Optimal load distribution for the detection of vm-based ddos attacks in the cloud,” IEEE Transactions on Services Computing, vol. 13, no. 1, pp. 114–129, 2020.
- A. Yao, G. Li, X. Li, F. Jiang, J. Xu, and X. Liu, “Differential privacy in edge computing-based smart city applications: Security issues, solutions, and future directions,” Array, 2023.
- R. V. Deshmukh and K. K. Devadkar, “Understanding ddos attack & its effect in cloud environment,” Procedia Computer Science, vol. 49, pp. 202–210, 2015.
- D. E. Denning, “An intrusion-detection model,” IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222–232, 1987.
- J. A. Perez-Diaz, I. A. Valdovinos, K.-K. R. Choo, and D. Zhu, “A flexible sdn-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning,” IEEE Access, vol. 8, pp. 155 859–155 872, 2020.
- M. S. Elsayed, N.-A. Le-Khac, S. Dev, and A. D. Jurcut, “Ddosnet: A deep-learning model for detecting network attacks,” in 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), 2020.
- P. Verma, S. Tapaswi, and W. W. Godfrey, “An adaptive threshold-based attribute selection to classify requests under ddos attack in cloud-based systems,” Arabian Journal for Science and Engineering, vol. 45, no. 4, pp. 2813–2834, 2020.
- Rusyaidi, S. Jaf, and Z. Ibrahim, “Detecting distributed denial of service in network traffic with deep learning,” International Journal of Advanced Computer Science and Applications, vol. 13, pp. 34–41, 2022.
- “Ddos evaluation dataset (cicddos2019),” 2019, [Accessed: 03-05-2023]. [Online]. Available:
https://www.unb.ca/cic/datasets/ddos-2019.html - “What was the largest ddos attack of all time?” [Accessed: 05-03-2023]. [Online]. Available:
https://www.cloudflare.com/learning/ddos/famous-ddos-attacks - “Eight-hour DDoS attack struck AWS customers,” 2019, [Accessed: 25-Mar-2023]. [Online]. Available:
https://www.darkreading.com/cloud/eight-hour-ddos-attack-struckaws-customers/d/d-id/1336165 - M. Alazab, S.-H. Hong, and J. Ng, “Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in australia,” Future Generation Computer Systems, vol. 116, pp. 22–29, 2021.
- R. Chalapathy and S. Chawla, “Deep learning for anomaly detection: A survey,” 2019.
- Y. Jia, F. Zhong, A. Alrawais, B. Gong, and X. Cheng, “Flow-guard: an intelligent edge defense mechanism against ioi ddos attacks,” IEEE Internet of Things Journal, no. 1, 2020.
- Y. Xiao, C. Xing, T. Zhang, and Z. Zhao, “An intrusion detection model based on feature reduction and convolutional neural networks,” IEEE Access, vol. 7, pp. 42 210–42 219, 2019.
- B. Hussain, Q. Du, B. Sun, and Z. Han, “Deep learning-based ddos-attack detection for cyber–physical system over 5g network,” IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 860–870, 2021.
- R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinezdel Rincon, and D. Siracusa, “Lucid: A practical, lightweight deep learning solution for ddos attack detection,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 876–889, 2020.
- L. Wang and Y. Liu, “A ddos attack detection method based on information entropy and deep learning in sdn,” in 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2020.
- L. Ma, Y. Chai, L. Cui, D. Ma, Y. Fu, and A. Xiao, “A deep learning-based ddos detection framework for internet of things,” in 2020 IEEE International Conference on Communications (ICC), 2020.
- J. Kim, J. Kim, H. L. Thu, and H. Kim, “Long short-term memory recurrent neural network classifier for intrusion detection,” in 2016 International Conference on Platform Technology and Service (PlatCon), 2016.
- S. Naseer et al., “Enhanced network anomaly detection based on deep neural networks,” IEEE Access, vol. 6, pp. 48 231–48 246, 2018.
- Ö. Aslan, “A methodology to detect distributed denial of service attacks,” Informatics Tech Journal, vol. 15, no. 2, pp. 149–158, 2022.
- M. V. Gaur and R. Kumar, “MLSTM: Multiclass long short-term memory based approach for detection of ddos attacks,” Philippine Statistician, vol. 71, no. 3s2, pp. 1375–1394, 2022.
- D. Kumar, R. K. Pateriya, R. K. Gupta, V. Dehalwar, and A. Sharma, “Ddos detection using deep learning,” Procedia Computer Science, vol. 218, pp. 2420–2429, 2023.
- Sowmya and T. M. Anita, “An intelligent hybrid gapi feature selection technique for network intrusion detection systems,” International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 7s, pp. 718–731, 2023.
- L. Y. Ahmed, M. M. Hamdy, and H. Mahmoud, “Improved ddos detection utilizing deep neural networks and feedforward neural networks as auto encoder,” Future Internet, vol. 14, no. 8, pp. 240–248, 2022.
- “Ddos evaluation dataset (cicddos2019),” 2019, [Accessed: 25-03-2023]. [Online]. Available:
https://www.unb.ca/cic/datasets/ddos-2019.html - M. A. Ferrag, L. Shu, H. Djallel, and K.-K. R. Choo, “Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0,” Electronics (Basel), vol. 10, no. 11, p. 1257, 2021.