We propose a DDoS attack path tracing system (AT-GCN) based on attack traceability knowledge base and graph convolutional network (GCN).
Nov 1, 2023 · In order to solve this problem, we propose a DDoS attack path tracing system (AT-GCN) based on attack traceability knowledge base and graph ...
Request PDF | On Sep 1, 2023, Kun Li and others published AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN | Find,
AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN. Computer Networks. 2023-11 | Journal article.
AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN · Author Picture Kun Li. Security Research Institute of China ...
People also ask
What are the 3 types of DDoS attacks?
How are DDoS attacks tracked?
What techniques are used for detecting DoS and DDoS attacks?
What is the attacking method of DDoS?
... Denial of Service (DDoS) attack environment. Read more. Download · Share · AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base ...
AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN. Request PDF. Restricted access. Computer Networks. Profile Image.
Mar 14, 2024 · This study introduces a robust solution for the detection of Distributed Denial of Service (DDoS) attacks in Internet of Things (IoT) systems.
You can interact with this user to gain follow. Journal article. AT-GCN: A DDoS attack path tracing system based on attack traceability knowledge base and GCN.
Jan 23, 2015 · No - There is no useful way to trace the source of such an attack. A DDoS will come from hundreds or thousands of machines, probably in multiple countries.