Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Mustapha Belouch"'
Publikováno v:
Intelligent Data Analysis. 22:1209-1226
Publikováno v:
Security and Communication Networks, Vol 2018 (2018)
Cloud Computing services are often delivered through HTTP protocol. This facilitates access to services and reduces costs for both providers and end-users. However, this increases the vulnerabilities of the Cloud services face to HTTP DDoS attacks. H
Publikováno v:
Applied Intelligence. 48:3193-3208
Even though advanced Machine Learning (ML) techniques have been adopted for DDoS detection, the attack remains a major threat of the Internet. Most of the existing ML-based DDoS detection approaches are under two categories: supervised and unsupervis
Publikováno v:
Procedia Computer Science. 127:1-6
Nowadays, network intrusion is considered as one of the major concerns in network communications. Thus, the developed network intrusion detection systems aim to identify attacks or malicious activities in a network environment. Various methods have b
Publikováno v:
Procedia Computer Science. 127:35-41
Nearly two decades after its emergence, the Cloud Computing remains gaining traction among organizations and individual users. Many security issues arise with the transition to this computing paradigm including intrusions detection. Intrusion and att
Autor:
Salah El Hadaj, Mustapha Belouch
Publikováno v:
ICC
This paper investigates the possibility of using ensemble learning methods to improve the performance of intrusion detection systems. We compare an ensemble of three ensemble learning methods, boosting, bagging and stacking in order to improve the de
Publikováno v:
International Journal of Advanced Computer Science and Applications. 8
In this paper, we present a two-stage classifier based on RepTree algorithm and protocols subset for network intrusion detection system. To evaluate the performance of our approach, we used the UNSW-NB15 data set and the NSL-KDD data set. In first ph
Publikováno v:
International Journal of Advanced Computer Science and Applications. 8
DoS attack tools have become increasingly sophis-ticated challenging the existing detection systems to continually improve their performances. In this paper we present a victim-end DoS detection method based on Artificial Neural Networks (ANN). In th