Journal ArticleDOI
DDoS flooding attack detection scheme based on F-divergence
Reads0
Chats0
TLDR
This work investigates a class of intelligent denial of service attacks which, unlike high-rate attacks, are difficult for other's schemes to detect and employs Total Variation Distance (TVD) to measure horizontal and vertical similarity among flows.About:
This article is published in Computer Communications.The article was published on 2012-06-01. It has received 39 citations till now. The article focuses on the topics: Application layer DDoS attack & False positives and false negatives.read more
Citations
More filters
Journal ArticleDOI
DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy
Xinlei Ma,Yonghong Chen +1 more
TL;DR: Experimental results show that the proposed variation of Lyapunov exponent outperforms entropy-based method while reflecting relationship between source IPs and destination IPs, which is enabled by the possibility of combining their entropies.
Journal ArticleDOI
Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization
Claude Fachkha,Mourad Debbabi +1 more
TL;DR: A survey on darknet finds that Honeyd is probably the most practical tool to implement darknet sensors, and future deployment of darknet will include mobile-based VOIP technology, and specific darknet areas that require a significantly greater amount of attention from the research community are identified.
Journal ArticleDOI
Security Data Collection and Data Analytics in the Internet: A Survey
TL;DR: This paper surveys existing studies about security-related data collection and analytics for the purpose of measuring the Internet security and proposes several additional requirements for security- related data analytics in order to make the analytics flexible and scalable.
Journal ArticleDOI
Defense mechanisms against Distributed Denial of Service attacks : A survey
TL;DR: A discussion of the difference between the aforementioned mechanisms categorizations based on characteristics of the way of detection, defense, and response as well as orientations for future researches is provided.
Journal ArticleDOI
Modeling and Detection of Flooding-Based Denial-of-Service Attack in Wireless Ad Hoc Network Using Bayesian Inference
N. Nishanth,A. Mujeeb +1 more
TL;DR: The proposed method can successfully defend any type of flooding-based DoS attack in wireless ad hoc network with higher detection accuracy and extremely lower false detection rate.
References
More filters
Book
Elements of information theory
Thomas M. Cover,Joy A. Thomas +1 more
TL;DR: The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Proceedings Article
Inferring internet denial-of-service activity
TL;DR: This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.
Proceedings ArticleDOI
Mining anomalies using traffic feature distributions
TL;DR: It is argued that the distributions of packet features observed in flow traces reveals both the presence and the structure of a wide range of anomalies, and that using feature distributions, anomalies naturally fall into distinct and meaningful clusters that can be used to automatically classify anomalies and to uncover new anomaly types.
Proceedings ArticleDOI
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
TL;DR: An enhancement to CDNs is proposed that offers better protection to Web sites against flash events and trace-driven simulations are used to study the effect of the enhancement on CDNs and Web sites.
Journal ArticleDOI
Survey of network-based defense mechanisms countering the DoS and DDoS problems
TL;DR: This survey analyzes the design decisions in the Internet that have created the potential for denial of service attacks and the methods that have been proposed for defense against these attacks, and discusses potential countermeasures against each defense mechanism.