Journal ArticleDOI
Detection of DDoS attacks and flash events using information theory metricsAn empirical investigation
Sunny Behal,Krishan Kumar +1 more
Reads0
Chats0
TLDR
The results clearly show that the GE and GID metrics perform well in comparison with other metrics and have reduced false positive rate (FPR).About:
This article is published in Computer Communications.The article was published on 2017-05-01. It has received 44 citations till now. The article focuses on the topics: Network security.read more
Citations
More filters
Journal ArticleDOI
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
TL;DR: In this paper, the authors proposed a new dataset, called Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks, and evaluated the reliability of the dataset using different statistical and machine learning methods for forensics purposes.
Journal ArticleDOI
A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework
TL;DR: This study proposes a new network forensics framework, called a Particle Deep Framework (PDF), which describes the digital investigation phases for identifying and tracing attack behaviors in IoT networks, and results reveal a high performance of the proposed framework for discovering and tracing cyber-attack events compared with the other techniques.
Journal ArticleDOI
D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events
TL;DR: An ISP level distributed, flexible, automated, and collaborative (D-FACE) defense system which not only distributes the computational and storage complexity to the nearest point of presence routers but also leads to an early detection of DDoS attacks and flash events.
Journal ArticleDOI
Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks
TL;DR: This article reduces the feature dimensionality of large-scale IoT network traffic data using the encoding phase of long short-term memory autoencoder (LAE), and the deep BLSTM model demonstrates robustness against model underfitting and overfitting and achieves good generalisation ability in binary and multiclass classification scenarios.
Journal ArticleDOI
Statistical Application Fingerprinting for DDoS Attack Mitigation
TL;DR: By leveraging transport layer packet-level and flow-level features, new structures called application fingerprints are generated, which express such features in a compact and efficient manner based on the generated fingerprints, which are used to propose a novel traffic classification framework.
References
More filters
Journal ArticleDOI
A mathematical theory of communication
TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book
The Mathematical Theory of Communication
TL;DR: The Mathematical Theory of Communication (MTOC) as discussed by the authors was originally published as a paper on communication theory more than fifty years ago and has since gone through four hardcover and sixteen paperback printings.
Journal ArticleDOI
The Mathematical Theory of Communication
Proceedings Article
Inferring internet denial-of-service activity
TL;DR: This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.
Journal ArticleDOI
httperf—a tool for measuring web server performance
David Mosberger,Tai Jin +1 more
TL;DR: In this article, the authors describe a tool for measuring web server performance called httperf, which provides a flexible facility for generating various HTTP workloads and for measuring server performance.