Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Comparative Analysis between the k-means and Fuzzy c-means Algorithms to Detect UDP Flood DDoS Attack on a SDN/NFV Environment. DOI: 10.5220 ...
DDoS Attacks. Conference Paper. Comparative Analysis between the k-means and Fuzzy c-means Algorithms to Detect UDP Flood DDoS Attack on a SDN/NFV Environment.
A study and an analysis of two unsupervised machine learning algorithms used to detect DDoS attacks in an SDN/NFV simulated environment and the k-means ...
Comparative Analysis between the k-means and Fuzzy c-means Algorithms to Detect UDP Flood DDoS Attack on a SDN/NFV Environment.
In this research work two important clustering algorithms namely centroid based K-Means and representative object based FCM (Fuzzy C-Means) clustering ...
Missing: Detect UDP Flood DDoS Attack SDN/ NFV Environment.
People also ask
Comparative Analysis between the k-means and Fuzzy c-means Algorithms to Detect UDP Flood DDoS Attack on a SDN/NFV Environment. Speaker: João Ribeiro de ...
Comparative Analysis between the k-means and Fuzzy c-means Algorithms to Detect UDP Flood DDoS Attack on a SDN/NFV Environment ... detect DDoS attacks in ...
Mar 15, 2024 · ABSTRACT Software Defined network (SDN), as a new network architecture, is the direction of future network development.
Missing: Comparative | Show results with:Comparative
We conducted a literature review on popular DDoS attack detection and mitigation technologies in SDN and categorized and evaluated them according to the ...
ML-DL algorithms utilized in IDS—are developed. Using these two taxonomies summary and comparison. of existing IDS solutions in SDN are also presented ...