Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2
Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2
Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2
Blockchain Framework for Communication between Vehicle through IoT Devices and Sensors
Volume-3 | Issue-2
Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3
A Review on Data Securing Techniques using Internet of Medical Things
Volume-3 | Issue-3
Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2
Maximizing the Prediction Accuracy in Tweet Sentiment Extraction using Tensor Flow based Deep Neural Networks
Volume-3 | Issue-2
Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4
DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING
Volume-1 | Issue-1
Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3
Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2
Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2
Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics
Volume-3 | Issue-4
Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2
Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2
Characterizing WDT subsystem of a Wi-Fi controller in an Automobile based on MIPS32 CPU platform across PVT
Volume-2 | Issue-4
Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4
Design of Data Mining Techniques for Online Blood Bank Management by CNN Model
Volume-3 | Issue-3
Ethereum and IOTA based Battery Management System with Internet of Vehicles
Volume-3 | Issue-3
Volume - 1 | Issue - 1 | september 2019
Published
September, 2019
The telecommunication network that is the assemblage of the terminal nodes enables the whole to be connected. The swift progress in the telecommunication networks and the information technology has enabled a seamless connection and the capacity to store and communicate vast scale of information in the form of text and voice that are sensitive. This makes the telecommunication networks prey to multiple cyber-threats of which the DDOS (distributed denial of service) are the more predominant type of the cyber-threat causing the denial of the services to the users. So the paper utilizing the combination of the neural network and the support vector machine presents the detection and the classification method for the DDOS attacks in the telecommunication network. The performance evaluation using the network simulator-2 enables to have the enhanced detection accuracy for the proposed method.
KeywordsTelecommunication network machine learning distributed denial of service cyber threats detection accuracy neural network support vector machine
Full Article PDF Download Article PDF