Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme
Distributed denial of service (DDoS) attacks often use botnets to generate a high volume of packets and adopt controlled zombies for flooding a victim’s network over the Internet. Analysing the multiple sources of DDoS attacks typically involves reconstructing attack paths between the victim and att...
Main Authors: | Hsiao-Chung Lin, Ping Wang, Wen-Hui Lin, Kuo-Ming Chao, Zong-Yu Yang |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-07-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/13/7/1295 |
Similar Items
-
A Multiple-Swarm Particle Swarm Optimisation Scheme for Tracing Packets Back to the Attack Sources of Botnet
by: Hsiao-Chung Lin, et al.
Published: (2021-01-01) -
Development of an Internet Protocol Traceback Scheme for Denial of Service Attack Source Detection
by: O. W. Salami, et al.
Published: (2019-09-01) -
Development of an Internet Protocol Traceback Scheme for Denial of Service Attack Source Detection
by: O. W. Salami, I. J. Umoh, E. A. Adedokun
Published: (2019-12-01) -
Self-Sustainable Non-Toxic Locust Control Using Electric Field & Real-Time Remote Monitoring Using Android Application
by: Basit Ali
Published: (2022-06-01) -
On Distributed Denial of Service Current Defense Schemes
by: Seth Djane Kotey, et al.
Published: (2019-01-01)