메뉴 건너뛰기




Volumn 43, Issue 2, 2018, Pages 499-508

Feature Selection of Denial-of-Service Attacks Using Entropy and Granular Computing

Author keywords

DoS attack; Entropy; Intrusion detection systems

Indexed keywords


EID: 85040330254     PISSN: 2193567X     EISSN: 21914281     Source Type: Journal    
DOI: 10.1007/s13369-017-2634-8     Document Type: Article
Times cited : (46)

References (40)
  • 2
    • 85040332269 scopus 로고    scopus 로고
    • P.: 2014 Global report on the cost of cyber crime
    • Institute, P.: 2014 Global report on the cost of cyber crime. HP Enterprise Security p. 31 (2014)
    • (2014) HP Enterprise Security , pp. 31
  • 3
    • 85040328636 scopus 로고    scopus 로고
    • Layering based network intrusion detection system to enhance network attacks detection. Int
    • Yi, M.A.; Phyu, T.: Layering based network intrusion detection system to enhance network attacks detection. Int. J. Sci. Res. 2(9), 10091302 (2013)
    • (2013) J. Sci. Res. , vol.2 , Issue.9 , pp. 10091302
    • Yi, M.A.1    Phyu, T.2
  • 4
    • 79957530146 scopus 로고    scopus 로고
    • Low-rate DDoS attacks detection and traceback by using new information metrics
    • Xiang, Y.; Li, K.; Zhou, W.: Low-rate DDoS attacks detection and traceback by using new information metrics. IEEE Trans. Inf. Forensics Secur. 6, 426–437 (2011)
    • (2011) IEEE Trans. Inf. Forensics Secur. , vol.6 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 5
    • 84904646449 scopus 로고    scopus 로고
    • A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
    • Khan, S.; Shiraz, M.; Wahab, A.W.A.; Gani, A.; Han, Q.; Rahman, Z.B.A.: A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing. Sci. World J. 2014, 547062 (2014). doi:10.1155/2014/547062
    • (2014) Sci. World J , vol.2014
    • Khan, S.1    Shiraz, M.2    Wahab, A.W.A.3    Gani, A.4    Han, Q.5    Rahman, Z.B.A.6
  • 7
    • 17744370129 scopus 로고    scopus 로고
    • Low rate TCP denial-of-service attack detection at edge routers
    • Shevtekar, A.; Anantharam, K.; Ansari, N.: Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett. 9, 363–365 (2005)
    • (2005) IEEE Commun. Lett. , vol.9 , pp. 363-365
    • Shevtekar, A.1    Anantharam, K.2    Ansari, N.3
  • 10
    • 84939936955 scopus 로고    scopus 로고
    • Shannon information entropy for an infinite circular well
    • Song, X.-D.; Sun, G.-H.; Dong, S.-H.: Shannon information entropy for an infinite circular well. Phys. Lett. A 379, 1402–1408 (2015)
    • (2015) Phys. Lett. A , vol.379 , pp. 1402-1408
    • Song, X.-D.1    Sun, G.-H.2    Dong, S.-H.3
  • 11
    • 84953896682 scopus 로고    scopus 로고
    • Fisher information and Shannon entropy of position-dependent mass oscillators
    • Macedo, D.; Guedes, I.: Fisher information and Shannon entropy of position-dependent mass oscillators. Phys. A Stat. Mech. Appl. 434, 211–219 (2015)
    • (2015) Phys. A Stat. Mech. Appl. , vol.434 , pp. 211-219
    • Macedo, D.1    Guedes, I.2
  • 12
    • 84919909185 scopus 로고    scopus 로고
    • Acoustic emission detection of rail defect based on wavelet transform and Shannon entropy
    • Zhang, X.; Feng, N.; Wang, Y.; Shen, Y.: Acoustic emission detection of rail defect based on wavelet transform and Shannon entropy. J. Sound Vib. 339, 419–432 (2015)
    • (2015) J. Sound Vib. , vol.339 , pp. 419-432
    • Zhang, X.1    Feng, N.2    Wang, Y.3    Shen, Y.4
  • 13
    • 84870053104 scopus 로고    scopus 로고
    • Local Shannon entropy measure with statistical tests for image randomness
    • Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J.P.; Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)
    • (2013) Inf. Sci. , vol.222 , pp. 323-342
    • Wu, Y.1    Zhou, Y.2    Saveriades, G.3    Agaian, S.4    Noonan, J.P.5    Natarajan, P.6
  • 14
    • 85011382936 scopus 로고    scopus 로고
    • Concepts reduction in formal concept analysis with fuzzy setting using Shannon entropy
    • Singh, P.K.; Cherukuri, A.K.; Li, J.: Concepts reduction in formal concept analysis with fuzzy setting using Shannon entropy. Int. J. Mach. Learn. Cybernet. 8(1), 179–189 (2017)
    • (2017) Int. J. Mach. Learn. Cybernet. , vol.8 , Issue.1 , pp. 179-189
    • Singh, P.K.1    Cherukuri, A.K.2    Li, J.3
  • 15
    • 84942839237 scopus 로고    scopus 로고
    • Fuzzy concept lattice reduction using Shannon entropy and Huffman coding
    • Singh, P.K.; Gani, A.: Fuzzy concept lattice reduction using Shannon entropy and Huffman coding. J. Appl. Non-Classical Logics 25(2), 101–119 (2015)
    • (2015) J. Appl. Non-Classical Logics , vol.25 , Issue.2 , pp. 101-119
    • Singh, P.K.1    Gani, A.2
  • 16
    • 84896290706 scopus 로고    scopus 로고
    • Applications of entropy in finance: a review
    • Zhou, R.; Cai, R.; Tong, G.: Applications of entropy in finance: a review. Entropy 15, 4909–4931 (2013)
    • (2013) Entropy , vol.15 , pp. 4909-4931
    • Zhou, R.1    Cai, R.2    Tong, G.3
  • 19
    • 84887481112 scopus 로고    scopus 로고
    • Granular computing: perspectives and challenges
    • Yao, J.T.; Vasilakos, A.V.; Pedrycz, W.: Granular computing: perspectives and challenges. IEEE Trans. Cybernet. 43, 1977–1989 (2013)
    • (2013) IEEE Trans. Cybernet. , vol.43 , pp. 1977-1989
    • Yao, J.T.1    Vasilakos, A.V.2    Pedrycz, W.3
  • 20
    • 84884381061 scopus 로고    scopus 로고
    • Paper: natural computing: a problem solving paradigm with granular information processing
    • Pal, S.K.; Meher, S.K.: Paper: natural computing: a problem solving paradigm with granular information processing. Appl. Soft Comput. 13, 3944–3955 (2013)
    • (2013) Appl. Soft Comput. , vol.13 , pp. 3944-3955
    • Pal, S.K.1    Meher, S.K.2
  • 23
    • 77951110390 scopus 로고    scopus 로고
    • Entropy-based profiling of network traffic for detection of security attack
    • Lee, T.-H.; He, J.-D.: Entropy-based profiling of network traffic for detection of security attack. In: TENCON 2009-2009 IEEE Region 10 Conference, pp. 1–5 (2009)
    • (2009) TENCON 2009-2009 IEEE Region 10 Conference , pp. 1-5
    • Lee, T.-H.1    He, J.-D.2
  • 29
    • 84919623751 scopus 로고    scopus 로고
    • Research of clustering algorithm based on information entropy and frequency sensitive discrepancy metric in anomaly detection
    • Li, H.; Wu, Q.: Research of clustering algorithm based on information entropy and frequency sensitive discrepancy metric in anomaly detection. In: International Conference on Information Science and Cloud Computing Companion (ISCC-C), 2013, pp. 799–805 (2013)
    • (2013) International Conference on Information Science and Cloud Computing Companion (ISCC-C), 2013 , pp. 799-805
    • Li, H.1    Wu, Q.2
  • 32
    • 84994407167 scopus 로고    scopus 로고
    • Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment
    • Priyanka, N.; Mishra, A.; et al.: Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. IJCSI Int. J. Comput. Sci. Issues 10(2), 142–146 (2013)
    • (2013) IJCSI Int. J. Comput. Sci. Issues , vol.10 , Issue.2 , pp. 142-146
    • Priyanka, N.1    Mishra, A.2
  • 34
    • 84897500180 scopus 로고    scopus 로고
    • A novel solution to handle DDOS attack in MANET
    • Chhabra, M.; et al.: A novel solution to handle DDOS attack in MANET. J. Inf. Secur. 4(3), 153–165 (2013)
    • (2013) J. Inf. Secur. , vol.4 , Issue.3 , pp. 153-165
    • Chhabra, M.1
  • 35
    • 84897558662 scopus 로고    scopus 로고
    • An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET)
    • Chhabra, M.; Gupta, B.B.: An efficient scheme to prevent DDoS flooding attacks in mobile ad-hoc network (MANET). Res. J. Appl. Sci. Eng. Technol. 7(10), 2033–2039 (2014)
    • (2014) Res. J. Appl. Sci. Eng. Technol. , vol.7 , Issue.10 , pp. 2033-2039
    • Chhabra, M.1    Gupta, B.B.2
  • 37
    • 84963679961 scopus 로고    scopus 로고
    • Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment
    • Gupta, B.B.; Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. (2016). doi:10.1007/s00521-016-2317-5
    • (2016) Neural Comput. Appl.
    • Gupta, B.B.1    Badve, O.P.2
  • 38
    • 85068810383 scopus 로고    scopus 로고
    • Concept lattice reduction using difference subset of attributes as information granules
    • Singh, P.K.; Kumar, C.A.: Concept lattice reduction using difference subset of attributes as information granules. Granul. Comput. (2017). doi:10.1007/s41066-016-0036-z
    • (2017) Granul. Comput.
    • Singh, P.K.1    Kumar, C.A.2
  • 39
    • 85011884955 scopus 로고    scopus 로고
    • Complex vague set based concept lattice
    • Singh, P.K.: Complex vague set based concept lattice. Chaos Solitons Fractals 96, 145–153 (2017)
    • (2017) Chaos Solitons Fractals , vol.96 , pp. 145-153
    • Singh, P.K.1
  • 40
    • 85011423354 scopus 로고    scopus 로고
    • Three-way fuzzy concept lattice representation using neutrosophic set
    • Singh, P.K.: Three-way fuzzy concept lattice representation using neutrosophic set. Int. J. Mach. Learn. Cybernet. 8(1), 69–79 (2017)
    • (2017) Int. J. Mach. Learn. Cybernet. , vol.8 , Issue.1 , pp. 69-79
    • Singh, P.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.