References
- Pathan A-SK, Azad S, Khan R, et al. Security mechanisms and data access protocols in innovative wireless networks. London: Sage; 2018.
- Yong-xiong Z, Liang-ming W, Lu-xia Y. A network attack discovery algorithm based on unbalanced sampling vehicle evolution strategy for intrusion detection. Int J Comput Appl. 2017: 1–9.
- Zargar ST, Joshi J, Tipper D. A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Commun Surv Tutorials. 2013;15(4):2046–2069. doi: https://doi.org/10.1109/SURV.2013.031413.00127
- Toledo AL, Wang X. Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks. IEEE Trans Inf Forensics Secur. 2008;3(3):347–358. doi: https://doi.org/10.1109/TIFS.2008.926098
- Guo Y, Ten CW, Hu S, et al. Modeling distributed denial of service attack in advanced metering infrastructure. 2015 IEEE power & energy society innovative smart grid technologies conference (ISGT); 2015. p. 1–5.
- Dwivedi S, Vardhan M, Tripathi S, et al. Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evol Intell. 2019: 1–15.
- Kumar N, Singh AK, Srivastava S. Feature selection for interest flooding attack in named data networking. Int J Comput Appl. 2019:1–10.
- Xu W, Hu G, Ho DWC, et al. Distributed secure cooperative control under denial-of-service attacks from multiple ADVERSARIES. IEEE Trans Cybern. 2019: 1–10.
- Mishra S, Sagban R, Yakoob A, et al. Swarm intelligence in anomaly detection systems: an overview. Int J Comput Appl. 2018: 1–10.
- Ametepe W, Wang C, Ocansey SK, et al. Data provenance collection and security in a distributed environment: a survey. Int J Comput Appl. 2018: 70–74.
- Mansouri A, Majidi B, Shamisa A. Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures. Int J Comput Appl. 2018: 1–10.
- Shukla AK, Pippal SK, Chauhan SS. An empirical evaluation of teaching–learning-based optimization, genetic algorithm and particle swarm optimization. Int J Comput Appl. 2019: 70–74.
- Dwivedi S, Vardhan M, Tripathi S. Incorporating evolutionary computation for securing wireless network against cyberthreats. J. Supercomput. 2020: 1–38.
- Shukla AK, Singh P, Vardhan M. A new hybrid wrapper TLBO and SA with SVM approach for gene expression data. Inf Sci. 2019;503:238–254. doi: https://doi.org/10.1016/j.ins.2019.06.063
- Shukla AK, Singh P, Vardhan M. An adaptive inertia weight teaching-learning-based optimization algorithm and its applications. Appl Math Model. 2020;77:309–326. doi: https://doi.org/10.1016/j.apm.2019.07.046
- Selvakumar B, Muneeswaran K. Firefly algorithm based feature selection for network intrusion detection. Comput Secur. 2018.
- Venkatraman S, Surendiran B. Adaptive hybrid intrusion detection system for crowd sourced multimedia internet of things systems. Multimed Tools Appl. 2019.
- Jing X, Yan Z, Liang X, et al. Network TrafÞc fusion and analysis against DDoS flooding attacks with a novel reversible sketch. Inf Fusion. 2018;51:100–113. doi: https://doi.org/10.1016/j.inffus.2018.10.013
- Lima Filho FSD, Silveira FA, de Medeiros Brito Junior A, et al. Smart detection: an online approach for DoS/DDoS attack detection using machine learning. Secur Commun Netw. 2019.
- Praseed A, Santhi Thilagam P. DDos attacks at the application layer: Challenges and research perspectives for safeguarding web applications. IEEE Commun Surv Tutorials. 2019;21(1):661–685. doi: https://doi.org/10.1109/COMST.2018.2870658
- Chen W, Ding D, Dong H, et al. Distributed resilient filtering for power systems subject to denial-of-service attacks. IEEE Trans Syst Man Cybern Syst. 2019;49(8):1688–1697. doi: https://doi.org/10.1109/TSMC.2019.2905253
- Tan Z, Jamdagni A, He X, et al. A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans Parallel Distrib Syst. 2014;25(2):447–456. doi: https://doi.org/10.1109/TPDS.2013.146
- Cui J, Wang M, Luo Y, et al. DDos detection and defense mechanism based on cognitive-inspired computing in SDN. Future Gener Comput Syst. 2019;97:275–283. doi: https://doi.org/10.1016/j.future.2019.02.037
- Bhuvaneswari BA, Selvakumar S. Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks. Neurocomputing. 2019;340:294–308. doi: https://doi.org/10.1016/j.neucom.2019.02.047
- Prasad KM, Reddy ARM, Rao KV. BARTD: bio-inspired anomaly based real time detection of under rated App-DDoS attack on web. J King Saud Univ Comput Inf Sci. 2017.
- Gavrilis D, Dermatas E. Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Comput Netw. 2005;48(2):235–245. doi: https://doi.org/10.1016/j.comnet.2004.08.014
- Du D, Li X, Li W, et al. ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks. IEEE Trans Syst Man Cybern Syst. 2019;49(8):1–14. doi: https://doi.org/10.1109/TSMC.2019.2896292
- Arun Raj Kumar P, Selvakumar S. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Comput Commun. 2013;36(3):303–319. doi: https://doi.org/10.1016/j.comcom.2012.09.010
- Luo H, Chen Z, Li J, et al. Preventing distributed denial-of-service flooding attacks with dynamic path identifiers. IEEE Trans Inf Forensics Secur. 2017;12(8):1801–1815. doi: https://doi.org/10.1109/TIFS.2017.2688414
- Viegas E, Santin A, Bessani A, et al. Bigflow: real-time and reliable anomaly-based intrusion detection for high-speed networks. Future Gener Comput Syst. 2019;93:473–485. doi: https://doi.org/10.1016/j.future.2018.09.051
- Vidal JM, Orozco ALS, Villalba LJG. Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evol Comput. 2018;38:94–108. doi: https://doi.org/10.1016/j.swevo.2017.07.002
- Fathy A. Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded PV array. Sol Energy. 2018;171:638–651. doi: https://doi.org/10.1016/j.solener.2018.07.014
- Ewees AA, Abd Elaziz M, Houssein EH. Improved grasshopper optimization algorithm using opposition-based learning. Expert Syst Appl. 2018;112:156–172. doi: https://doi.org/10.1016/j.eswa.2018.06.023
- Zhang X, Miao Q, Zhang H, et al. A parameter-adaptive VMD method based on grasshopper optimization algorithm to analyze vibration signals from rotating machinery. Mech Syst Signal Process. 2018;108:58–72. doi: https://doi.org/10.1016/j.ymssp.2017.11.029
- Wei J, Zhang R, Yu Z, et al. A BPSO-SVM algorithm based on memory renewal and enhanced mutation mechanisms for feature selection. Appl Soft Comput. 2017;58:176–192. doi: https://doi.org/10.1016/j.asoc.2017.04.061
- Singh KJ, De T. MLP-GA based algorithm to detect application layer DDoS attack. J Inf Secur Appl. 2017;36:145–153.
- Farid DM, Zhang L, Rahman CM, et al. Hybrid decision tree and naïve Bayes classifiers for multi-class classification tasks. Expert Syst Appl. 2014;41(4):1937–1946. doi: https://doi.org/10.1016/j.eswa.2013.08.089
- Kumar PAR, Selvakumar S. Distributed denial of service attack detection using an ensemble of neural classifier. Comput Commun. 2011;34(11):1328–1341. doi: https://doi.org/10.1016/j.comcom.2011.01.012
- Du D, Li X, Li W, et al. ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks. IEEE Trans Syst Man Cybern Syst. 2019.
- Mafarja M, Aljarah I, Heidari AA, et al. Binary dragonfly optimization for feature selection using time-varying transfer functions. Knowl Based Syst. 2018;161:185–204. doi: https://doi.org/10.1016/j.knosys.2018.08.003
- Jan SU, Ahmed S, Shakhov V, et al. Toward a Lightweight intrusion detection system for the internet of things. IEEE Access. 2019;7:42450–42471. doi: https://doi.org/10.1109/ACCESS.2019.2907965
- Gu Y, Li K, Guo Z, et al. Semi-supervised k-means ddos detection method using hybrid feature selection algorithm. IEEE Access. 2019;7:64351–64365. doi: https://doi.org/10.1109/ACCESS.2019.2917532