메뉴 건너뛰기




Volumn 35, Issue 11, 2012, Pages 1380-1391

DDoS flooding attack detection scheme based on F-divergence

Author keywords

DDoS; Entropy; F divergence; Flash crowd; Total variation distance

Indexed keywords

AGGREGATE TRAFFIC; DDOS; DDOS ATTACK; DENIAL OF SERVICE ATTACKS; DISTRIBUTED DENIAL OF SERVICE ATTACK; F-DIVERGENCE; FALSE NEGATIVES; FALSE POSITIVE; FEATURE-BASED; FLASH CROWD; FLOODING ATTACKS; HIGH RATE; IP ADDRESSS; MALICIOUS TRAFFIC; REAL-TIME DETECTION; SOFT THRESHOLD; TOTAL VARIATION;

EID: 84862009854     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2012.04.002     Document Type: Article
Times cited : (37)

References (37)
  • 1
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network- based defense mechanisms countering the DoS and DDoS problems
    • T. Peng, C. Leckie, and K. Ramamohanarao Survey of network- based defense mechanisms countering the DoS and DDoS problems ACM Computing Surveys 39 1 2007 1 42
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 1-42
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 2
    • 25844458510 scopus 로고    scopus 로고
    • Reduction of Quality (RoQ) attacks on Internet end-systems
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang Reduction of quality (RoQ) attacks on internet end systems Proceedings of IEEE INFOCOM 2 March 2005 1362 1372 (Pubitemid 41390787)
    • (2005) Proceedings - IEEE INFOCOM , vol.2 , pp. 1362-1372
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3    Zhang, Y.4
  • 3
    • 38549119585 scopus 로고    scopus 로고
    • Spectral analysis of TCP flows for defense against reduction-of-quality attacks
    • DOI 10.1109/ICC.2007.204, 4288875, 2007 IEEE International Conference on Communications, ICC'07
    • Y. Chen, K. Hwang, Spectral Analysis of TCP flows for defense against reduction-of-quality attacks, in: The 2007 IEEE International Conference on Communications (ICC'07), June 2007, pp. 1203-1210. (Pubitemid 351145701)
    • (2007) IEEE International Conference on Communications , pp. 1203-1210
    • Chen, Y.1    Hwang, K.2
  • 4
    • 33845584261 scopus 로고    scopus 로고
    • Collaborative change detection of DDoS attacks on community and ISP networks
    • DOI 10.1109/CTS.2006.27, 1644164, Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, CTS 2006
    • Y. Chen, K. Hwang, Collaborative change detection of DDoS attacks on community and ISP networks", in: The IEEE International Symposium on Collaborative Technologies and Systems (CTS 2006), May 2006, pp. 401-410. (Pubitemid 44930984)
    • (2006) Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, CTS 2006 , vol.2006 , pp. 401-410
    • Chen, Y.1    Hwang, K.2
  • 5
    • 67649871082 scopus 로고    scopus 로고
    • Detecting VoIP-specific denial-of-service using change-point method
    • on Feb 2009
    • Hongli Zhang, Zhimin Gu, Caixia Liu, Tang Jie, Detecting VoIP-specific denial-of-service using change-point method, in: 11th International Conf. on Feb. 2009, pp. 1059-1064.
    • 11th International Conf , pp. 1059-1064
    • Zhang, H.1    Gu, Z.2    Liu, C.3    Jie, T.4
  • 9
    • 35148840623 scopus 로고    scopus 로고
    • Detecting denial-of-service attacks using the wavelet transform
    • Mohamed. Hamdi, and Noureddine. Boudriga Detecting denial-of-service attacks using the wavelet transform Computer Communications 30 16 2007 3203 3213
    • (2007) Computer Communications , vol.30 , Issue.16 , pp. 3203-3213
    • Hamdi, M.1    Boudriga, N.2
  • 10
    • 33751110003 scopus 로고    scopus 로고
    • Wavelet based Denial-of-Service detection
    • DOI 10.1016/j.cose.2006.08.017, PII S0167404806001210
    • G. Carl, R.R. Brooks, and S. Rai Wavelet based denial-of-service detection Computers and Security 25 8 2006 600 615 (Pubitemid 44765088)
    • (2006) Computers and Security , vol.25 , Issue.8 , pp. 600-615
    • Carl, G.1    Brooks, R.R.2    Rai, S.3
  • 11
    • 39049125624 scopus 로고    scopus 로고
    • Controlling IP spoofing through interdomain packet filters
    • DOI 10.1109/TDSC.2007.70224
    • Z. Duan, X. Yuan, J. Chandrashekar, Controlling IP Spoofing through Inter domain Packet Filters, in: IEEE Trans. on Dependable and Secure, Computing, 5(1), January-March 2008, pp. 22-36. (Pubitemid 351239530)
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.1 , pp. 22-36
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 13
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-count filtering
    • DOI 10.1109/TNET.2006.890133
    • H. Wang, C. Jin, K.G. Shin, Defense against spoofed IP traffic using hop-count filtering, in: IEEE/ACM Trans.s on Networking, vol. 15, No. 1, February 2007, pp. 40-53. (Pubitemid 46464416)
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 16
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial-of-service attacks: Characterization and implications for CDNs and web sites
    • ACM Press New York
    • J. Jung, B. Krishnamurthy, and M. Rabinovich Flash crowds and denial-of-service attacks: characterization and implications for CDNs and web sites Proceedings of the International World Wide Web Conference 2002 ACM Press New York 293 304
    • (2002) Proceedings of the International World Wide Web Conference , pp. 293-304
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 19
    • 33646878980 scopus 로고    scopus 로고
    • Detecting distributed denial-of-service attacks using kolmogorov complexity gauges
    • Amit. Kulkarni, and Stephen. Bush Detecting distributed denial-of-service attacks using kolmogorov complexity gauges Journal of Network and Systems Management 14 1 March 2006 69 80
    • (2006) Journal of Network and Systems Management , vol.14 , Issue.1 , pp. 69-80
    • Kulkarni, A.1    Bush, S.2
  • 21
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • DOI 10.1016/j.jpdc.2006.04.007, PII S0743731506000852
    • Y. Chen, and K. Hwang Collaborative detection and filtering of shrew DDoS attacks using spectral analysis Journal of Parallel and Distributed Computing 66 9 2006 1137 1151 (Pubitemid 44205394)
    • (2006) Journal of Parallel and Distributed Computing , vol.66 , Issue.9 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 23
    • 35549011836 scopus 로고    scopus 로고
    • Robust and efficient detection of DDoS attacks for large-scale internet
    • DOI 10.1016/j.comnet.2007.08.008, PII S1389128607002320
    • K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci Robust and efficient detection of DDoS attacks for large-scale internet Computer Networks 51 September 2007 5036 5056 (Pubitemid 350008118)
    • (2007) Computer Networks , vol.51 , Issue.18 , pp. 5036-5056
    • Lu, K.1    Wu, D.2    Fan, J.3    Todorovic, S.4    Nucci, A.5
  • 24
    • 58149490850 scopus 로고    scopus 로고
    • Information theory based detection against network behavior mimicking DDoS attack
    • S. Yu, W. Zhou, and R. Doss Information theory based detection against network behavior mimicking DDoS attack IEEE Communications Letters 12 4 April 2008 319 321
    • (2008) IEEE Communications Letters , vol.12 , Issue.4 , pp. 319-321
    • Yu, S.1    Zhou, W.2    Doss, R.3
  • 26
    • 84862005286 scopus 로고    scopus 로고
    • accessed November 05, 2010
    • http://tracer.csl.sony.co.jp/mawi/, accessed November 05, 2010.
  • 27
    • 84862019850 scopus 로고    scopus 로고
    • accessed November 05, 2010
    • http://www.lasr.cs.ucla.edu/ddos/traces/, accessed November 05, 2010.
  • 28
    • 84862006567 scopus 로고    scopus 로고
    • http://www.caida.org/data/passive/ddos-200708040-dataset.xml.
  • 29
    • 0024925404 scopus 로고
    • Distance measures for signal processing and pattern recognition
    • DOI 10.1016/0165-1684(89)90079-0
    • M. Basseville Distance measures for signal processing and pattern recognition Signal Processing 18 4 1989 349 369 (Pubitemid 20636472)
    • (1989) Signal Processing , vol.18 , Issue.4 , pp. 349-369
    • Basseville Michele1
  • 34
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • DOI 10.1109/TDSC.2005.35
    • J. Mirkovic, P. Reiher, D-WARD: a source-end defense against flooding denial-of-service attacks, in: IEEE Transactions on Dependable and Secure, Computing, 2(3), July-Sept. 2005, pp. 216-232. (Pubitemid 41560432)
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.