메뉴 건너뛰기




Volumn , Issue , 2014, Pages 80-84

Information metrics for low-rate DDoS attack detection: A comparative evaluation

Author keywords

DDoS attack; entropy; information metric; low rate; network traffic

Indexed keywords

COMPUTATION THEORY; ENTROPY; HIGH SPEED NETWORKS; INFORMATION THEORY; NETWORK SECURITY; PROBABILITY DISTRIBUTIONS;

EID: 84908638568     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IC3.2014.6897151     Document Type: Conference Paper
Times cited : (19)

References (15)
  • 1
    • 84873059665 scopus 로고    scopus 로고
    • A rank correlation based detection against distributed reflection DoS Attacks
    • W. Wei, F. Chen, Y. Xia, and G. Jin, "A Rank Correlation Based Detection against Distributed Reflection DoS Attacks," IEEE Communications Letters, vol. 17, no. 1, pp. 173-175, 2013
    • (2013) IEEE Communications Letters , vol.17 , Issue.1 , pp. 173-175
    • Wei, W.1    Chen, F.2    Xia, Y.3    Jin, G.4
  • 2
    • 84897441938 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks: Methods, tools and future directions
    • M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, and J. K. Kalita, "Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions," The Computer Journal, vol. 57, no. 4, pp. 537-556, 2014
    • (2014) The Computer Journal , vol.57 , Issue.4 , pp. 537-556
    • Bhuyan, M.H.1    Kashyap, H.J.2    Bhattacharyya, D.K.3    Kalita, J.K.4
  • 3
    • 79551523280 scopus 로고    scopus 로고
    • Traceback of DDoS attacks using entropy variations
    • March
    • S. Yu, W. Zhou, R. Doss, and W. Jia, "Traceback of DDoS Attacks Using Entropy Variations," IEEE Trans. Parallel Distributed Systems, vol. 22, no. 3, pp. 412-425, March 2011
    • (2011) IEEE Trans. Parallel Distributed Systems , vol.22 , Issue.3 , pp. 412-425
    • Yu, S.1    Zhou, W.2    Doss, R.3    Jia, W.4
  • 4
    • 79957530146 scopus 로고    scopus 로고
    • Low-Rate DDoS attacks detection and traceback by using new information metrics
    • Y. Xiang, K. Li, and W. Zhou, "Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics," IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426-437, 2011
    • (2011) IEEE Transactions on Information Forensics and Security , vol.6 , Issue.2 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 6
    • 84865731679 scopus 로고    scopus 로고
    • Flow level detection and filtering of low-rate DDoS
    • October
    • C. Zhang, Z. Cai, W. Chen, X. Luo, and J. Yin, "Flow Level Detection and Filtering of Low-rate DDoS," Comput. Netw., vol. 56, no. 15, pp. 3417-3431, October 2012
    • (2012) Comput. Netw , vol.56 , Issue.15 , pp. 3417-3431
    • Zhang, C.1    Cai, Z.2    Chen, W.3    Luo, X.4    Yin, J.5
  • 8
    • 84860544941 scopus 로고    scopus 로고
    • FireCol: A collaborative protection network for the detection of flooding ddos attacks
    • J. Francois, I. Aib, and R. Boutaba, "FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks," IEEE/ACM Transactions on Networking, vol. 20, no. 6, pp. 1828-1841, 2012
    • (2012) IEEE/ACM Transactions on Networking , vol.20 , Issue.6 , pp. 1828-1841
    • Francois, J.1    Aib, I.2    Boutaba, R.3
  • 10
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. E. Shannon, "A Mathematical Theory of Communication," Bell system technical journal, vol. 27, pp. 397-423, 1948
    • (1948) Bell System Technical Journal , vol.27 , pp. 397-423
    • Shannon, C.E.1
  • 12
    • 84894646147 scopus 로고    scopus 로고
    • Network anomaly detection: Methods, systems and tools
    • "Network Anomaly Detection: Methods, Systems and Tools," IEEE Communications Surveys Tutorials, vol. 16, no. 1, pp. 303-336, 2014
    • (2014) IEEE Communications Surveys Tutorials , vol.16 , Issue.1 , pp. 303-336
  • 13
    • 84908651594 scopus 로고    scopus 로고
    • MIT LLS DDOS 0.2.2Massachusetts Institute of Technology Cambridge,MA
    • MIT Lincoln Laboratory Datasets, "MIT LLS DDOS 0.2.2," http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ ideval/data/2000data.html, 2000, Massachusetts Institute of Technology, Cambridge,MA
    • (2000) MIT Lincoln Laboratory Datasets


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.