Intelligent IoT Attack Detection Design via ODLLM with Feature Ranking-based Knowledge Base Authors: Satvik Verma, Qun Wang, E. Wes Bethel | Published: 2025-03-27 DDoS Attack DetectionLLM SecurityNetwork Traffic Analysis 2025.03.27 2025.05.27 Literature Database
DrLLM: Prompt-Enhanced Distributed Denial-of-Service Resistance Method with Large Language Models Authors: Zhenyu Yin, Shang Liu, Guangyuan Xu | Published: 2024-09-11 | Updated: 2025-01-13 DDoS Attack DetectionLLM Performance EvaluationPrompt Injection 2024.09.11 2025.05.27 Literature Database
A Novel Self-Attention-Enabled Weighted Ensemble-Based Convolutional Neural Network Framework for Distributed Denial of Service Attack Classification Authors: Kanthimathi S, Shravan Venkatraman, Jayasankar K S, Pranay Jiljith T, Jashwanth R | Published: 2024-09-01 | Updated: 2024-10-12 DDoS Attack DetectionModel Performance EvaluationMachine Learning Method 2024.09.01 2025.05.27 Literature Database
Individual Packet Features are a Risk to Model Generalisation in ML-Based Intrusion Detection Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2024-06-07 DDoS Attack DetectionData ObfuscationPacket Interaction 2024.06.07 2025.05.27 Literature Database
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach Authors: Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani | Published: 2024-06-04 DDoS Attack DetectionFew-Shot LearningPrototype Network 2024.06.04 2025.05.27 Literature Database
DoLLM: How Large Language Models Understanding Network Flow Data to Detect Carpet Bombing DDoS Authors: Qingyang Li, Yihang Zhang, Zhidong Jia, Yannan Hu, Lei Zhang, Jianrong Zhang, Yongming Xu, Yong Cui, Zongming Guo, Xinggong Zhang | Published: 2024-05-13 DDoS Attack DetectionLLM Performance EvaluationModel Performance Evaluation 2024.05.13 2025.05.27 Literature Database
A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection Authors: Raja Giryes, Lior Shafir, Avishai Wool | Published: 2024-05-12 DDoS Attack DetectionData PreprocessingEvaluation Method 2024.05.12 2025.05.27 Literature Database
DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches Authors: Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang | Published: 2024-04-19 DDoS Attack DetectionIoT Device IdentificationWatermarking 2024.04.19 2025.05.27 Literature Database
Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15 DDoS Attack DetectionAttack MethodAdversarial Example 2024.04.15 2025.05.27 Literature Database
usfAD Based Effective Unknown Attack Detection Focused IDS Framework Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 DDoS Attack DetectionIntrusion Detection SystemUnknown Attack Detection 2024.03.17 2025.05.27 Literature Database