Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

TÜBİTAK

2018

Entropy

Articles 1 - 3 of 3

Full-Text Articles in Engineering

A Generalized Detection System To Detect Distributed Denial Of Service Attacks And Flash Events For Information Theory Metrics, Sunny Behal, Krishan Kumar, Monika Sachdeva Jan 2018

A Generalized Detection System To Detect Distributed Denial Of Service Attacks And Flash Events For Information Theory Metrics, Sunny Behal, Krishan Kumar, Monika Sachdeva

Turkish Journal of Electrical Engineering and Computer Sciences

Distributed denial of service (DDoS) attacks pose a severe threat to extensively used web-based services and applications. Many detection approaches have been proposed in the literature, but ensuring the security and availability of data, resources, and services to end users remains an ongoing research challenge. Nowadays, the traffic volume of legitimate users has also increased manifold. A flash event (FE) is a high-rate legitimate traffic situation wherein millions of legitimate users start accessing a particular network resource, such as a web server, simultaneously. The detection of DDoS attacks becomes more challenging when DDoS attacks are launched during behaviorally similar FEs. …


Threshold-Based Distributed Ddos Attack Detection In Isp Networks, Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan Jan 2018

Threshold-Based Distributed Ddos Attack Detection In Isp Networks, Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan

Turkish Journal of Electrical Engineering and Computer Sciences

The purpose of this paper is to propose a more efficient and accurate distributed denial of service (DDoS) attack detection mechanism that detects DDoS attacks by monitoring the incoming traffic on the edge routers of ISP networks. It can be implemented as a module or agent function on the machine that is responsible for processing router traffic. The detection algorithm works by monitoring the traffic passing through the edge routers and identifying the occurrence of DDoS attacks or flash events. The algorithm calculates different values like the normalized router entropy, packet rate, and entropy rate and compares them against the …


An Efficient Recurrent Fuzzy Cmac Model Based On A Dynamic-Group--Based Hybrid Evolutionary Algorithm For Identification And Prediction Applications, Chin-Ling Lee, Chengjian Lin Jan 2018

An Efficient Recurrent Fuzzy Cmac Model Based On A Dynamic-Group--Based Hybrid Evolutionary Algorithm For Identification And Prediction Applications, Chin-Ling Lee, Chengjian Lin

Turkish Journal of Electrical Engineering and Computer Sciences

This article presents an efficient TSK-type recurrent fuzzy cerebellar model articulation controller (T-RFCMAC) model based on a dynamic-group--based hybrid evolutionary algorithm (DGHEA) for solving identification and prediction problems. The proposed T-RFCMAC model is based on the traditional CMAC model and the Takagi--Sugeno--Kang (TSK) parametric fuzzy inference system. Otherwise, the recurrent network, which imports feedback links with a receptive field cell, is embedded in the T-RFCMAC model, and the feedback units are used as memory elements. The DGHEA, which is a hybrid of the dynamic-group quantum particle swarm optimization (QPSO) and the Nelder--Mead method, is proposed for adjusting the parameters of …