Research on Network Abnormal Behavior Recognition Model Based on Parallel Decision Tree Algorithm
Abstract
References
Index Terms
- Research on Network Abnormal Behavior Recognition Model Based on Parallel Decision Tree Algorithm
Recommendations
DDoS attack detection method based on network abnormal behaviour in big data environment
Distributed denial of service (DDoS) attack becomes a rapidly growing problem with the fast development of the internet. The existing DDoS attack detection methods have time-delay and low detection rate. This paper presents a DDoS attack detection method ...
Optimal Network Hardening Model Based on Parallel Genetic Algorithm
ICICEE '12: Proceedings of the 2012 International Conference on Industrial Control and Electronics EngineeringBecause the existed approaches to harden networks have an unavoidable exponential worse-case complexity, and are not scalable to large networks, this paper proposes an optimal network hardening model (ONHM) based on parallel genetic algorithm by ...
A Research of Behavior-Based Penetration Testing Model of the Network
ICICEE '12: Proceedings of the 2012 International Conference on Industrial Control and Electronics EngineeringTwo types of behavior-based penetration testing model of the network and their vulnerabilities were discussed in this paper. The paper provides a comprehensive method which includes three phases and a model based on behavior anomaly and detection. It ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 10Total Downloads
- Downloads (Last 12 months)7
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format