Efficient detection of DDoS attacks with important attributes
Citations
689 citations
Cites methods from "Efficient detection of DDoS attacks..."
...To extract from an actual traffic the features used in this dataset, it would be necessary to preprocess the packets flowing to the victim....
[...]
255 citations
187 citations
152 citations
Cites methods from "Efficient detection of DDoS attacks..."
...Referring to [13], we selected 9 important features (As shown in Table 1, the characteristics of the blue background are the features selected for us), which have the maximum information gain and chi-square statistic for DDoS detection, including TABLE I ALL 41 FEATURES IN THE FOUR TYPES...
[...]
101 citations
Cites background from "Efficient detection of DDoS attacks..."
...Despite the high accuracy and performance obtained with some techniques, machine learning algorithms tend to suffer from several limitations: (i) the difficulty of determining the best set of discriminators to classify flows [13]; (ii) the availability of labeled training data for classification [8] [14]; (iii) the trade-offs between different machine learning algorithms regarding accuracy and performance [14]; (iv) the sheer amount of traffic data that makes it difficult to handle and to promptly detect malicious activities [15] [10]; (v) the availability of a high amount of resources, such as management systems and middleboxes, to collect traffic information [16]....
[...]
..., Distributed Denial of Service (DDoS) attacks [10], [11]....
[...]
References
8,046 citations
5,366 citations
2,251 citations
"Efficient detection of DDoS attacks..." refers background in this paper
...978-1-4244-3309-4/08/$25.00 ©2008 IEEE Keywords: Intrusion detection system; DDoS attack detection; attribute selection; Bayesian networks; C4.5...
[...]
1,600 citations
1,288 citations
"Efficient detection of DDoS attacks..." refers background in this paper
...978-1-4244-3309-4/08/$25.00 ©2008 IEEE Keywords: Intrusion detection system; DDoS attack detection; attribute selection; Bayesian networks; C4.5...
[...]