scispace - formally typeset
Journal ArticleDOI

Detection of DDoS attacks and flash events using information theory metricsAn empirical investigation

Reads0
Chats0
TLDR
The results clearly show that the GE and GID metrics perform well in comparison with other metrics and have reduced false positive rate (FPR).
About
This article is published in Computer Communications.The article was published on 2017-05-01. It has received 44 citations till now. The article focuses on the topics: Network security.

read more

Citations
More filters
Journal ArticleDOI

Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset

TL;DR: In this paper, the authors proposed a new dataset, called Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks, and evaluated the reliability of the dataset using different statistical and machine learning methods for forensics purposes.
Journal ArticleDOI

A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework

TL;DR: This study proposes a new network forensics framework, called a Particle Deep Framework (PDF), which describes the digital investigation phases for identifying and tracing attack behaviors in IoT networks, and results reveal a high performance of the proposed framework for discovering and tracing cyber-attack events compared with the other techniques.
Journal ArticleDOI

D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events

TL;DR: An ISP level distributed, flexible, automated, and collaborative (D-FACE) defense system which not only distributes the computational and storage complexity to the nearest point of presence routers but also leads to an early detection of DDoS attacks and flash events.
Journal ArticleDOI

Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks

TL;DR: This article reduces the feature dimensionality of large-scale IoT network traffic data using the encoding phase of long short-term memory autoencoder (LAE), and the deep BLSTM model demonstrates robustness against model underfitting and overfitting and achieves good generalisation ability in binary and multiclass classification scenarios.
Journal ArticleDOI

Statistical Application Fingerprinting for DDoS Attack Mitigation

TL;DR: By leveraging transport layer packet-level and flow-level features, new structures called application fingerprints are generated, which express such features in a compact and efficient manner based on the generated fingerprints, which are used to propose a novel traffic classification framework.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book

The Mathematical Theory of Communication

TL;DR: The Mathematical Theory of Communication (MTOC) as discussed by the authors was originally published as a paper on communication theory more than fifty years ago and has since gone through four hardcover and sixteen paperback printings.
Proceedings Article

Inferring internet denial-of-service activity

TL;DR: This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.
Journal ArticleDOI

httperf—a tool for measuring web server performance

TL;DR: In this article, the authors describe a tool for measuring web server performance called httperf, which provides a flexible facility for generating various HTTP workloads and for measuring server performance.
Related Papers (5)