scispace - formally typeset
Journal ArticleDOI

DDoS flooding attack detection scheme based on F-divergence

Hamza Rahmani, +2 more
- 01 Jun 2012 - 
- Vol. 35, Iss: 11, pp 1380-1391
Reads0
Chats0
TLDR
This work investigates a class of intelligent denial of service attacks which, unlike high-rate attacks, are difficult for other's schemes to detect and employs Total Variation Distance (TVD) to measure horizontal and vertical similarity among flows.
About
This article is published in Computer Communications.The article was published on 2012-06-01. It has received 39 citations till now. The article focuses on the topics: Application layer DDoS attack & False positives and false negatives.

read more

Citations
More filters
Journal ArticleDOI

DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy

TL;DR: Experimental results show that the proposed variation of Lyapunov exponent outperforms entropy-based method while reflecting relationship between source IPs and destination IPs, which is enabled by the possibility of combining their entropies.
Journal ArticleDOI

Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization

TL;DR: A survey on darknet finds that Honeyd is probably the most practical tool to implement darknet sensors, and future deployment of darknet will include mobile-based VOIP technology, and specific darknet areas that require a significantly greater amount of attention from the research community are identified.
Journal ArticleDOI

Security Data Collection and Data Analytics in the Internet: A Survey

TL;DR: This paper surveys existing studies about security-related data collection and analytics for the purpose of measuring the Internet security and proposes several additional requirements for security- related data analytics in order to make the analytics flexible and scalable.
Journal ArticleDOI

Defense mechanisms against Distributed Denial of Service attacks : A survey

TL;DR: A discussion of the difference between the aforementioned mechanisms categorizations based on characteristics of the way of detection, defense, and response as well as orientations for future researches is provided.
Journal ArticleDOI

Modeling and Detection of Flooding-Based Denial-of-Service Attack in Wireless Ad Hoc Network Using Bayesian Inference

TL;DR: The proposed method can successfully defend any type of flooding-based DoS attack in wireless ad hoc network with higher detection accuracy and extremely lower false detection rate.
References
More filters
Book

Elements of information theory

TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Proceedings Article

Inferring internet denial-of-service activity

TL;DR: This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.
Proceedings ArticleDOI

Mining anomalies using traffic feature distributions

TL;DR: It is argued that the distributions of packet features observed in flow traces reveals both the presence and the structure of a wide range of anomalies, and that using feature distributions, anomalies naturally fall into distinct and meaningful clusters that can be used to automatically classify anomalies and to uncover new anomaly types.
Proceedings ArticleDOI

Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites

TL;DR: An enhancement to CDNs is proposed that offers better protection to Web sites against flash events and trace-driven simulations are used to study the effect of the enhancement on CDNs and Web sites.
Journal ArticleDOI

Survey of network-based defense mechanisms countering the DoS and DDoS problems

TL;DR: This survey analyzes the design decisions in the Internet that have created the potential for denial of service attacks and the methods that have been proposed for defense against these attacks, and discusses potential countermeasures against each defense mechanism.
Related Papers (5)