Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection

被引:0
|
作者
Huang, Xiang [1 ]
机构
[1] Hunan Mass Media Vocational and Technical College, Hunan, Changsha,410100, China
关键词
722 Computer Systems and Equipment - 723 Computer Software; Data Handling and Applications - 723.2 Data Processing and Image Processing - 902.3 Legal Aspects - 903.1 Information Sources and Analysis;
D O I
暂无
中图分类号
学科分类号
摘要
36
引用
收藏
相关论文
共 50 条
  • [1] Application of Computer Data Mining Technology Based on AKN Algorithm in Denial of Service Attack Defense Detection
    Huang, Xiang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [2] Research and Application of APT Attack Defense and Detection Technology Based on Big Data Technology
    Liu, Donglan
    Zhang, Hao
    Yu, Hao
    Liu, Xin
    Zhao, Yong
    Lv, Guodong
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 701 - 704
  • [3] Analysis on the Application of Data Mining Technology in Computer Network Virus Defense
    Sun, Hujun
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, MANAGEMENT AND ECONOMICS (SSME 2017), 2017, : 417 - 421
  • [4] Denial of Service Attack Detection using Dendritic Cell Algorithm
    Igbe, Obinna
    Ajayi, Oluwaseyi
    Saadawi, Tarek
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 294 - 299
  • [5] Attack Detection of Distributed Denial of Service Based on Splunk
    Su, Te-Jen
    Wang, Shih-Ming
    Chen, Yi-Feng
    Liu, Chao-Liang
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 397 - 400
  • [6] Computer vision based distributed denial of service attack detection for resource-limited devices
    Gebrye, Hayelom
    Wang, Yong
    Li, Fagen
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 120
  • [7] A Denial-of-Service Attack Based on Selfish Mining and Sybil Attack in Blockchain Systems
    Zhang, Jing
    Zha, Chunming
    Zhang, Qingbin
    Ma, Shaohua
    IEEE ACCESS, 2024, 12 : 170309 - 170320
  • [8] A Distributed Denial of Service Attack Sources Detection Technology for Cloud Computing
    Yang, Wenjun
    Wei, Dan
    2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 660 - 664
  • [9] Optimal Selfish Mining-Based Denial-of-Service Attack
    Wang, Qiuhua
    Li, Chengyu
    Xia, Tianyu
    Ren, Yizhi
    Wang, Dong
    Zhang, Guoyan
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 835 - 850
  • [10] SDoS: Selfish Mining-Based Denial-of-Service Attack
    Wang, Qiuhua
    Xia, Tianyu
    Wang, Dong
    Ren, Yizhi
    Miao, Gongxun
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3335 - 3349