<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01916nam a22001337a 4500</leader>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">68369</subfield>
    <subfield code="d">68366</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Engr. Iraj Memon</subfield>
    <subfield code="a">2-MCSE-04</subfield>
    <subfield code="a">Supervisor - Prof.Dr. Fareed Ahmed Jokhio</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">An Effective Distributed Denial of Service (DDOS) Attacks Detection Using Resilient Back-Propagation and Gradient Descent Training Algorithms (ME Thesis)</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Nawabshah</subfield>
    <subfield code="b">QUEST</subfield>
    <subfield code="c">2024</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">60p.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">ABSTRACT

In present time where everything is digital and various devices are connected with reliable and fast computer networks. Although networks are secure and can handle various types of networks attacks. However, it is challenging to detect Distributed Denial of Service (DDoS) attacks. Because these attacks are launched from trusted devices. During a DDoS attack, several requests are sent to a server from trusted computers or devices and server may go down completely or it can have delay in services which it is providing. This may cause serrious problems for the users of the system. Timely detection of such type of attacks is essential. This research work explores three Artificial Neural Network (ANN) models: the Feed forward Neural Network (FFNN), Cascade-Forward Neural Network (CCFNN), and Fitnet Neural Network (FNN) for the purpose of DDoS attack detection. For each neural network three training algorithms are used to training. This research, applied Resilient Back- propagation, Gradient Descent, and Conjugate Gradient with Powell-Beale Restarts techniques. The results of the study demonstrated that the Fitnet Neural Network outperformed the other models in terms of accuracy and required a shorter duration to achieve this accuracy across the three training algorithms mentioned.

Keywords: DDoS, DDoS attacks detection, Feed Forward Neural Network, Sparse Autoencoder</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Department of Computer Systems Engineering </subfield>
  </datafield>
  <datafield tag="856" ind1=" " ind2=" ">
    <subfield code="u">https://tinyurl.com/3r9d76pa</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">THESIS</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">RESEARCH</subfield>
    <subfield code="b">RESEARCH</subfield>
    <subfield code="d">2024-05-27</subfield>
    <subfield code="l">0</subfield>
    <subfield code="p">MP/89-1289</subfield>
    <subfield code="r">2024-05-27 00:00:00</subfield>
    <subfield code="w">2024-05-27</subfield>
    <subfield code="y">THESIS</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">RESEARCH</subfield>
    <subfield code="b">RESEARCH</subfield>
    <subfield code="d">2024-05-27</subfield>
    <subfield code="l">0</subfield>
    <subfield code="p">MP/89-1290</subfield>
    <subfield code="r">2024-05-27 00:00:00</subfield>
    <subfield code="w">2024-05-27</subfield>
    <subfield code="y">THESIS</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">RESEARCH</subfield>
    <subfield code="b">RESEARCH</subfield>
    <subfield code="d">2024-07-26</subfield>
    <subfield code="l">0</subfield>
    <subfield code="p">MP/91-1320</subfield>
    <subfield code="r">2024-07-26 00:00:00</subfield>
    <subfield code="w">2024-07-26</subfield>
    <subfield code="y">THESIS</subfield>
  </datafield>
</record>
