메뉴 건너뛰기




Volumn 6, Issue 2, 2011, Pages 426-437

Low-rate DDoS attacks detection and traceback by using new information metrics

Author keywords

Attack detection; information metrics; IP traceback; low rate distributed denial of service (DDoS) attack

Indexed keywords

ATTACK DETECTION; ATTACK TRAFFIC; DDOS ATTACK; DETECTION SCHEME; DISTRIBUTED DENIAL OF SERVICE ATTACK; FALSE POSITIVE RATES; GENERALIZED ENTROPIES; INFORMATION DISTANCE; INFORMATION METRICS; IP TRACEBACK; KULLBACK LEIBLER DIVERGENCE; NETWORK TRAFFIC; OPTIMAL DETECTION; TRACEBACK;

EID: 79957530146     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2107320     Document Type: Article
Times cited : (345)

References (30)
  • 1
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    • [Online]. Available
    • A. Chonka et al., "Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks," J. Netw. Comput. Applicat. Jun. 23, 2010 [Online]. Available: http://dx.doi.org/10.1016/j. jnca.2010.06.004
    • (2010) J. Netw. Comput. Applicat. Jun. , vol.23
    • Chonka, A.1
  • 2
    • 33746880318 scopus 로고    scopus 로고
    • ZSBT: A novel algorithm for tracing DoS attackers in MANETs
    • X. Jin et al., "ZSBT: A novel algorithm for tracing DoS attackers in MANETs," EURASIP J. Wireless Commun. Netw., vol. 2006, no. 2, pp. 1-9, 2006.
    • (2006) EURASIP J. Wireless Commun. Netw. , vol.2006 , Issue.2 , pp. 1-9
    • Jin, X.1
  • 3
    • 17744370129 scopus 로고    scopus 로고
    • Low rate TCP denial-of-service attack detection at edge routers
    • DOI 10.1109/LCOMM.2005.04008
    • A. Shevtekar, K. Anantharam, and N. Ansari, "Low rate TCP Denial- of-Service attack detection at edge routers," IEEE Commun. Lett., vol. 9, no. 4, pp. 363-365, Apr. 2005. (Pubitemid 40573761)
    • (2005) IEEE Communications Letters , vol.9 , Issue.4 , pp. 363-365
    • Shevtekar, A.1    Anantharam, K.2    Ansari, N.3
  • 4
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-service attack-detection techniques
    • DOI 10.1109/MIC.2006.5
    • G. Carl et al., "Denial-of-service attack-detection techniques," IEEE Internet Comput., vol. 10, no. 1, pp. 82-89, Jan./Feb. 2006. (Pubitemid 43159617)
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.R.3    Rai, S.4
  • 5
    • 68149178268 scopus 로고    scopus 로고
    • IP packet size entropy-based scheme for detection of DoS/DDoS attacks
    • P. Du and S. Abe, "IP packet size entropy-based scheme for detection of DoS/DDoS attacks," IEICE Trans. Inf. Syst., vol. E91-D, no. 5, pp. 1274-1281, 2008.
    • (2008) IEICE Trans. Inf. Syst. , vol.E91-D , Issue.5 , pp. 1274-1281
    • Du, P.1    Abe, S.2
  • 6
    • 0002974997 scopus 로고    scopus 로고
    • Synthesis of fractional Gaussian noise using linear approximation for generating self-similar network traffic
    • S. Ledesma and D. Liu, "Synthesis of fractional Gaussian noise using linear approximation for generating self-similar network traffic," Comput. Commun. Rev., vol. 30, no. 2, pp. 4-17, 2000.
    • (2000) Comput. Commun. Rev. , vol.30 , Issue.2 , pp. 4-17
    • Ledesma, S.1    Liu, D.2
  • 8
    • 0036859273 scopus 로고    scopus 로고
    • Fast and exact synthesis for 1-D fractional Brownian motion and fractional Gaussian noises
    • DOI 10.1109/LSP.2002.805311
    • E. Perrin et al., "Fast and exact synthesis for 1-D fractional Brownian motion and fractional Gaussian noises," IEEE Signal Process. Lett., vol. 9, no. 11, pp. 382-384, Nov. 2002. (Pubitemid 35428554)
    • (2002) IEEE Signal Processing Letters , vol.9 , Issue.11 , pp. 382-384
    • Perrin, E.1    Harba, R.2    Jennane, R.3    Iribarren, I.4
  • 11
    • 0038011179 scopus 로고    scopus 로고
    • Specification based anomaly detection: A new approach for detecting network intrusions
    • R. Sekar et al., "Specification based anomaly detection: A new approach for detecting network intrusions," in Proc. ACM Conf. Computer and Communications Security (CCS 2002), 2002, pp. 265-274.
    • (2002) Proc. ACM Conf. Computer and Communications Security (CCS 2002) , pp. 265-274
    • Sekar, R.1
  • 12
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
    • A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Comput. Netw., vol. 51, no. 12, pp. 3448-3470, 2007. (Pubitemid 46921030)
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 13
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 623-656
    • C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423 and 623-656, 1948.
    • (1948) Bell Syst. Tech. J. , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 14
    • 0347585673 scopus 로고    scopus 로고
    • Rényi extrapolation of Shannon entropy
    • K. Zyczkowski, "Rényi extrapolation of Shannon entropy," Open Syst. Inf. Dynamics, vol. 10, no. 3, pp. 297-310, 2003.
    • (2003) Open Syst. Inf. Dynamics , vol.10 , Issue.3 , pp. 297-310
    • Zyczkowski, K.1
  • 16
    • 0026914305 scopus 로고
    • Distribution estimation consistent in total variation and in two types of information divergence
    • Sep.
    • A. R. Barron, L. Gyorfi, and E. C. van der Meulen, "Distribution estimation consistent in total variation and in two types of information divergence," IEEE Trans. Inf. Theory, vol. 38, no. 5, pp. 1437-1454, Sep. 1992.
    • (1992) IEEE Trans. Inf. Theory , vol.38 , Issue.5 , pp. 1437-1454
    • Barron, A.R.1    Gyorfi, L.2    Van Der Meulen, E.C.3
  • 17
    • 0038038302 scopus 로고    scopus 로고
    • Estimation of the Kullback-Leibler divergence
    • Princeton, NJ: Princeton Univ. Press
    • M. Broniatowski, "Estimation of the Kullback-Leibler divergence," in Mathematical Methods of Statistics. Princeton, NJ: Princeton Univ. Press, 2003.
    • (2003) Mathematical Methods of Statistics
    • Broniatowski, M.1
  • 18
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of DDoS attacks over multiple network domains
    • DOI 10.1109/TPDS.2007.1111
    • Y. Chen, K. Hwang, and W.-S. Ku, "Collaborative detection of DDoS attacks over multiple network domains," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 12, pp. 1649-1662, Dec. 2007. (Pubitemid 350142414)
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 19
    • 41749090011 scopus 로고    scopus 로고
    • On some entropy functionals derived from Rényi information divergence
    • J.-F. Bercher, "On some entropy functionals derived from Rényi information divergence," Inf. Sci., vol. 178, no. 12, pp. 2489-2506, 2008.
    • (2008) Inf. Sci. , vol.178 , Issue.12 , pp. 2489-2506
    • Bercher, J.-F.1
  • 20
    • 67649889403 scopus 로고    scopus 로고
    • Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
    • Apr.
    • Y. Xiang, W. Zhou, and M. Guo, "Flexible deterministic packet marking: An IP traceback system to find the real source of attacks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567-580, Apr. 2009.
    • (2009) IEEE Trans. Parallel Distrib. Syst. , vol.20 , Issue.4 , pp. 567-580
    • Xiang, Y.1    Zhou, W.2    Guo, M.3
  • 21
    • 79957507657 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory Data Sets [Online]. Available
    • MIT Lincoln Laboratory Data Sets [Online]. Available: http:// www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/ 2000/LLS-DDOS-0.2.2.html
  • 22
    • 79957518374 scopus 로고    scopus 로고
    • CAIDA, 2010 [Online]. Available: http://data.caida.org/datasets/security/ ddos-20070804/
    • (2010) CAIDA [Online]. Available
  • 23
    • 33745205813 scopus 로고    scopus 로고
    • Inferring Internet denial-of-service activity
    • D. Moore et al., "Inferring Internet denial-of-service activity," ACM Trans. Comput. Syst., vol. 24, no. 2, pp. 115-139, 2006.
    • (2006) ACM Trans. Comput. Syst. , vol.24 , Issue.2 , pp. 115-139
    • Moore, D.1
  • 24
    • 25844469597 scopus 로고    scopus 로고
    • You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers
    • DOI 10.1109/TPDS.2005.114
    • T. K. T. Law, J. C. S. Lui, and D. K. Y. Yau, "You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers," IEEE Trans. Parallel Distrib. Syst., vol. 16, no. 9, pp. 799-813, Sep. 2005. (Pubitemid 41387761)
    • (2005) IEEE Transactions on Parallel and Distributed Systems , vol.16 , Issue.9 , pp. 799-813
    • Law, T.K.T.1    Lui, J.C.S.2    Yau, D.K.Y.3
  • 30
    • 58149490850 scopus 로고    scopus 로고
    • Information theory based detection against network behavior mimicking DDoS attacks
    • Apr.
    • S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking DDoS attacks," IEEE Commun. Lett., vol. 12, no. 4, pp. 319-321, Apr. 2008.
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.4 , pp. 319-321
    • Yu, S.1    Zhou, W.2    Doss, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.