The threat of a Distributed Denial of Service (DDoS) attack on web-based services and applications is grave. It only takes a few minutes for one of these attacks to cripple these services, making them unavailable to anyone. The problem has further persisted with the widespread adoption of insecure Internet of Things (IoT) devices across the Internet. In addition, many currently used rule-based detection systems are weak points for attackers. We conducted a comparative analysis of ML algorithms to detect and classify DDoS attacks in this paper. These classifiers compare Nave Bayes with J48 and Random Forest with ZeroR ML as well as other machine learning algorithms. It was found that using the PCA method, the optimal number of features could...
The Internet of Things (IoT) has emerged over the past ten years as the newest technology trend that...
Distributed Denial of Service (DDoS) attack can be made through numerous medium and became the one o...
Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The...
Attacks known as distributed denial of service (DDoS) compromise user privacy while disrupting inter...
Abstract: The Internet of Things (IoT) represents the start of a new age in information technology (...
The increasing Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) is leadi...
The security of the internet is seriously threatened by a distributed denial of service (DDoS) attac...
The rapid growth of IoT, smart devices, and 5G networks has increased the prevalence and complexity ...
The Internet of Things (IoT) is a complex and diverse network consisting of resource-constrained sen...
Defending against Distributed Denial of Service (DDoS) in the Internet of Things (IoT) computing env...
From smart homes to industrial environments, the IoT is an ally to easing daily activities, where so...
The prevalence of Internet of Things (IoT) systems deployment is increasing across various domains, ...
The exploitation of internet networks through denial of services (DoS) attacks has experienced a con...
Internet of Things that process tremendous confidential data have difficulty performing traditional ...
Today, the creation of more effective intrusion detection system (IDS) has become crucial due to the...
The Internet of Things (IoT) has emerged over the past ten years as the newest technology trend that...
Distributed Denial of Service (DDoS) attack can be made through numerous medium and became the one o...
Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The...
Attacks known as distributed denial of service (DDoS) compromise user privacy while disrupting inter...
Abstract: The Internet of Things (IoT) represents the start of a new age in information technology (...
The increasing Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) is leadi...
The security of the internet is seriously threatened by a distributed denial of service (DDoS) attac...
The rapid growth of IoT, smart devices, and 5G networks has increased the prevalence and complexity ...
The Internet of Things (IoT) is a complex and diverse network consisting of resource-constrained sen...
Defending against Distributed Denial of Service (DDoS) in the Internet of Things (IoT) computing env...
From smart homes to industrial environments, the IoT is an ally to easing daily activities, where so...
The prevalence of Internet of Things (IoT) systems deployment is increasing across various domains, ...
The exploitation of internet networks through denial of services (DoS) attacks has experienced a con...
Internet of Things that process tremendous confidential data have difficulty performing traditional ...
Today, the creation of more effective intrusion detection system (IDS) has become crucial due to the...
The Internet of Things (IoT) has emerged over the past ten years as the newest technology trend that...
Distributed Denial of Service (DDoS) attack can be made through numerous medium and became the one o...
Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The...