dc.date.accessioned | 2019-01-29T22:19:49Z | |
dc.date.accessioned | 2023-05-30T23:27:30Z | |
dc.date.available | 2019-01-29T22:19:49Z | |
dc.date.available | 2023-05-30T23:27:30Z | |
dc.date.created | 2019-01-29T22:19:49Z | |
dc.date.issued | 2018 | |
dc.identifier | 3029743 | |
dc.identifier | http://repositorio.ucsp.edu.pe/handle/UCSP/15760 | |
dc.identifier | https://doi.org/10.1007 / 978-3-030-02837-4_9 | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/6477573 | |
dc.description.abstract | Application Layer DDoS (AL-DDoS) is a major danger for Internet information services, because these attacks are easily performed and implemented by attackers and are difficult to detect and stop using traditional firewalls. Managing to saturate physically and computationally the information services offered on the network. Directly harming legitimate users, to deal with this type of attacks in the network layer previous approaches propose to use a configurable statistical model and observed that when being optimized in various configuration parameters Using Genetic Algorithms was able to optimize the effectiveness to detect Network Layer DDoS (NL-DDoS), however this method is not enough to stop DDoS at the level of application because this level presents different characteristics, that is why we propose a new method Configurable and optimized for different scenarios of Attacks that effectively detect AL-DDoS. © Springer Nature Switzerland AG 2018. | |
dc.language | eng | |
dc.publisher | Springer Verlag | |
dc.relation | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059943641&doi=10.1007%2f978-3-030-02837-4_9&partnerID=40&md5=da02e9e708e9db2cbae0666ac1824b78 | |
dc.rights | info:eu-repo/semantics/restrictedAccess | |
dc.source | Repositorio Institucional - UCSP | |
dc.source | Universidad Católica San Pablo | |
dc.source | Scopus | |
dc.subject | Artificial intelligence | |
dc.subject | Denial-of-service attack | |
dc.subject | Genetic algorithms | |
dc.subject | Information services | |
dc.subject | Network security | |
dc.subject | Soft computing | |
dc.subject | Application layers | |
dc.subject | Configuration parameters | |
dc.subject | DDOS | |
dc.subject | Internet information services | |
dc.subject | Legitimate users | |
dc.subject | Security | |
dc.subject | Statistical modeling | |
dc.subject | Variances analysis | |
dc.subject | Network layers | |
dc.title | AL-DDoS attack detection optimized with genetic algorithms | |
dc.type | info:eu-repo/semantics/article | |