Bhutto et al., 2022 - Google Patents

Reinforced Transformer Learning for VSI-DDoS Detection in Edge Clouds

Bhutto et al., 2022

View PDF
Document ID
16534964867195158318
Author
Bhutto A
Vu X
Elmroth E
Tay W
Bhuyan M
Publication year
Publication venue
IEEE Access

External Links

Snippet

Edge-driven software applications often deployed as online services in the cloud-to-edge continuum lack significant protection for services and infrastructures against emerging cyberattacks. Very-Short Intermittent Distributed Denial of Service (VSI-DDoS) attack is one …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/12Computer systems based on biological models using genetic models
    • G06N3/126Genetic algorithms, i.e. information processing using digital simulations of the genetic system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/14Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computer systems based on specific mathematical models
    • G06N7/005Probabilistic networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management

Similar Documents

Publication Publication Date Title
Huang et al. Data poisoning attacks to deep learning based recommender systems
Bhutto et al. Reinforced Transformer Learning for VSI-DDoS Detection in Edge Clouds
Lee et al. Meta dropout: Learning to perturb latent features for generalization
Moudoud et al. Detection and prediction of fdi attacks in iot systems via hidden markov model
Hameed et al. A deep learning approach for IoT traffic multi-classification in a smart-city scenario
Alabadi et al. Anomaly detection for cyber-security based on convolution neural network: A survey
Liu et al. Deep generative model and its applications in efficient wireless network management: A tutorial and case study
Ginart et al. Mldemon: Deployment monitoring for machine learning systems
Alomar et al. {CausalSim}: A Causal Framework for Unbiased {Trace-Driven} Simulation
Ngo et al. Adaptive anomaly detection for internet of things in hierarchical edge computing: A contextual-bandit approach
Sundqvist et al. Boosted ensemble learning for anomaly detection in 5G RAN
Smetanin et al. Modeling of distributed ledgers: Challenges and future perspectives
Patil et al. AI-Driven Adaptive Network Capacity Planning for Hybrid Cloud Architecture
Al-Maslamani et al. Toward secure federated learning for iot using drl-enabled reputation mechanism
LONG et al. A deep deterministic policy gradient-based method for enforcing service fault-tolerance in mec
Jain et al. Controlling federated learning for covertness
CN110784760B (en) Video playing method, video player and computer storage medium
Zheng et al. Flow-by-flow traffic matrix prediction methods: Achieving accurate, adaptable, low cost results
Khoei et al. ACapsule Q-learning based reinforcement model for intrusion detection system on smart grid
Li et al. An Empirical Study on GAN‐Based Traffic Congestion Attack Analysis: A Visualized Method
Su et al. Learning-based buffer starvation modeling for packets prefetching strategies of video streaming services
Xia et al. PT-ADP: A personalized privacy-preserving federated learning scheme based on transaction mechanism
Borylo et al. Neural Networks in Selected Aspects of Communications and Networking
Forough et al. DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the Edge
Lande et al. Swarm of Virtual Experts in the implementation of Semantic Networking