Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme

Distributed denial of service (DDoS) attacks often use botnets to generate a high volume of packets and adopt controlled zombies for flooding a victim’s network over the Internet. Analysing the multiple sources of DDoS attacks typically involves reconstructing attack paths between the victim and att...

Full description

Bibliographic Details
Main Authors: Hsiao-Chung Lin, Ping Wang, Wen-Hui Lin, Kuo-Ming Chao, Zong-Yu Yang
Format: Article
Language:English
Published: MDPI AG 2021-07-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/13/7/1295