

QoS based Optimal Source Filtering for Malicious Traffic Environment for Network Stability
Abstract
Keywords
References
Azadeh Noori Hoshyar, Adel Al-Jumailya , Afsaneh Noori Hoshyar.(2014). Comparing the Performance of Various Filters on Skin Cancer Images, International, ConfPRIDE 2013-2014, Procedia Computer Science, 42.
Chithra, P. L., & Henila, M. (2017). Defect identification in the fruit apple using K-Means Color Image Segmentation Algorithm. International Journal of Advanced Research in Computer Science, 8(8).
Dargie, W. and Poellabauer, C., "Fundamentals of wireless sensor networks: theory and practice", John Wiley and Sons, 2010 ISBN 978- 0-470-99765-9, pp. 168–183, 191–192
H.-J. Liao, C.-H. Richard Lin, Y.-C. Lin, and K.-Y. Tung, "Intrusion detection system: a comprehensive review," J Netw Comput Appl, vol. 36, no. 1, pp. 16–24, 2013a/01/01/ 2013
Huang, X.; Du, X.; Song, B. An Effective DDoS Defense Scheme for SDN. In Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6.
J. Lyngdoh, M. I. Hussain, S. Majaw, and H. K. Kalita, "An intrusion detection method using artificial immune system approach," in International conference on advanced informatics for computing research, 2018, pp. 379–387.
J. M. Gonzalez, M. Anwar, and J. B. D. Joshi, “A trust-based approach against IP-spoofing attacks,” 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp. 63–70, Jul. 2011.
Jia, Q.; Wang, H.; Fleck, D.; Li, F.; Stavrou, A.; Powell, W. Catch Me if You Can: A Cloud-Enabled DDoS Defense. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, Atlanta, GA, USA, 23–26 June 2014; pp. 264–275.
Kang, S.K.; Gligor, V.D.; Sekar, V. SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks. In Proceedings of the Internet Society—Networks, Distributed Systems and Security Symposium, San Diego, CA, USA, 21–24 February 2016.
P Jain, G Kaur, (2011). Analysis the impact of filters in spatial domain on grayscale image. International journal of computer applications, 36(11).
P. G. Neumann, “Inside Risks: denial-of-service attacks,” Commun. ACM, vol. 43, no. 4, p. 136, Apr. 2000.
Pawan Kumar Patidar, Lalit, Baldev Singh, Gaurav Bagaria (2014). Image Filtering using Linear and Non Linear Filter for Gaussian Noise, International Journal of Computer Applications, 93(8).
Pawar, Mohan V., and J. Anuradha. "Network security and types of attacks in network." Procedia Computer Science 48 (2015): 503-506.
Ward, Joseph, and Andrew Hobson. "Traffic simulation to identify malicious activity." U.S. Patent No. 10,084,806. 25 Sep. 2018.
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber, “How dynamic are IP addresses?,” in Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007, pp. 301–312.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.