60,516 research outputs found

    Preventing DDoS using Bloom Filter: A Survey

    Full text link
    Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time. This phenomenon harms the service providers, and hence, loss of business revenue. Therefore, DDoS is a grand challenge to defeat. There are numerous mechanism to defend DDoS, however, this paper surveys the deployment of Bloom Filter in defending a DDoS attack. The Bloom Filter is a probabilistic data structure for membership query that returns either true or false. Bloom Filter uses tiny memory to store information of large data. Therefore, packet information is stored in Bloom Filter to defend and defeat DDoS. This paper presents a survey on DDoS defending technique using Bloom Filter.Comment: 9 pages, 1 figure. This article is accepted for publication in EAI Endorsed Transactions on Scalable Information System

    Power electronics options for large wind farm integration : VSC-based HVDC transmission

    Get PDF
    This paper describes the use of voltage source converter based HVDC transmission (VSC transmission) system for grid integration of large wind farms over long distance. The wind farms can be based on either doubly-fed induction generator (DFIG) or fixed speed induction generator (FSIG). The paper describes the operation principles and control strategies of the proposed system. Automatic power balancing during network AC fault is achieved without communication between the two converters. PSCAD/EMTDC simulations are presented to demonstrate the robust performance and to validate the proposed system during various operating conditions such as variations of generation and AC fault conditions. The proposed VSC transmission system has technical and economic advantages over a conventional AC connection for integrating large wind farms over long distanc

    A traffic classification method using machine learning algorithm

    Get PDF
    Applying concepts of attack investigation in IT industry, this idea has been developed to design a Traffic Classification Method using Data Mining techniques at the intersection of Machine Learning Algorithm, Which will classify the normal and malicious traffic. This classification will help to learn about the unknown attacks faced by IT industry. The notion of traffic classification is not a new concept; plenty of work has been done to classify the network traffic for heterogeneous application nowadays. Existing techniques such as (payload based, port based and statistical based) have their own pros and cons which will be discussed in this literature later, but classification using Machine Learning techniques is still an open field to explore and has provided very promising results up till now
    • …
    corecore