Bhutto et al., 2022 - Google Patents
Reinforced Transformer Learning for VSI-DDoS Detection in Edge CloudsBhutto et al., 2022
View PDF- Document ID
- 16534964867195158318
- Author
- Bhutto A
- Vu X
- Elmroth E
- Tay W
- Bhuyan M
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Edge-driven software applications often deployed as online services in the cloud-to-edge continuum lack significant protection for services and infrastructures against emerging cyberattacks. Very-Short Intermittent Distributed Denial of Service (VSI-DDoS) attack is one …
- 238000001514 detection method 0 title abstract description 49
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/12—Computer systems based on biological models using genetic models
- G06N3/126—Genetic algorithms, i.e. information processing using digital simulations of the genetic system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | Data poisoning attacks to deep learning based recommender systems | |
Bhutto et al. | Reinforced Transformer Learning for VSI-DDoS Detection in Edge Clouds | |
Lee et al. | Meta dropout: Learning to perturb latent features for generalization | |
Moudoud et al. | Detection and prediction of fdi attacks in iot systems via hidden markov model | |
Hameed et al. | A deep learning approach for IoT traffic multi-classification in a smart-city scenario | |
Alabadi et al. | Anomaly detection for cyber-security based on convolution neural network: A survey | |
Liu et al. | Deep generative model and its applications in efficient wireless network management: A tutorial and case study | |
Ginart et al. | Mldemon: Deployment monitoring for machine learning systems | |
Alomar et al. | {CausalSim}: A Causal Framework for Unbiased {Trace-Driven} Simulation | |
Ngo et al. | Adaptive anomaly detection for internet of things in hierarchical edge computing: A contextual-bandit approach | |
Sundqvist et al. | Boosted ensemble learning for anomaly detection in 5G RAN | |
Smetanin et al. | Modeling of distributed ledgers: Challenges and future perspectives | |
Patil et al. | AI-Driven Adaptive Network Capacity Planning for Hybrid Cloud Architecture | |
Al-Maslamani et al. | Toward secure federated learning for iot using drl-enabled reputation mechanism | |
LONG et al. | A deep deterministic policy gradient-based method for enforcing service fault-tolerance in mec | |
Jain et al. | Controlling federated learning for covertness | |
CN110784760B (en) | Video playing method, video player and computer storage medium | |
Zheng et al. | Flow-by-flow traffic matrix prediction methods: Achieving accurate, adaptable, low cost results | |
Khoei et al. | ACapsule Q-learning based reinforcement model for intrusion detection system on smart grid | |
Li et al. | An Empirical Study on GAN‐Based Traffic Congestion Attack Analysis: A Visualized Method | |
Su et al. | Learning-based buffer starvation modeling for packets prefetching strategies of video streaming services | |
Xia et al. | PT-ADP: A personalized privacy-preserving federated learning scheme based on transaction mechanism | |
Borylo et al. | Neural Networks in Selected Aspects of Communications and Networking | |
Forough et al. | DELA: A Deep Ensemble Learning Approach for Cross-layer VSI-DDoS Detection on the Edge | |
Lande et al. | Swarm of Virtual Experts in the implementation of Semantic Networking |