2018
DOI: 10.1155/2018/9463653
|View full text |Cite
|
Sign up to set email alerts
|

A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack

Abstract: The application-layer distributed denial of service (AL-DDoS) attack makes a great threat against cyberspace security. The attack detection is an important part of the security protection, which provides effective support for defense system through the rapid and accurate identification of attacks. According to the attacker’s different URL of the Web service, the AL-DDoS attack is divided into three categories, including a random URL attack and a fixed and a traverse one. In order to realize identification of a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2019
2019
2025
2025

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 12 publications
0
10
0
1
Order By: Relevance
“…In [19], the authors propose a new two-step method for DDoS attack detection, which combines the approaches of network traffic entropy and the TSK Fuzzy System (TSK-FS), and shows that the TSK-FS DDoS detector reaches enhanced sensitivity and robustness in the detection process. Reference [20] shows a method to identify DDoS attacks by computing entropy and frequency-sorted distributions of selected packet attributes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [19], the authors propose a new two-step method for DDoS attack detection, which combines the approaches of network traffic entropy and the TSK Fuzzy System (TSK-FS), and shows that the TSK-FS DDoS detector reaches enhanced sensitivity and robustness in the detection process. Reference [20] shows a method to identify DDoS attacks by computing entropy and frequency-sorted distributions of selected packet attributes.…”
Section: Related Workmentioning
confidence: 99%
“…On the other point of view, we will see a sharp decline of the entropy of destination IP until the number of attack packets reaches the width of the entropy sliding window, and this is a traditional and the most popular detection basis. But actually, the result will be interfered with by some indicators such as the target numbers, policies that motivate traffic to burst up, which is called ''a benign flash crowd'' in Zhao's research [19], etc.…”
Section: : Value Counter Dictionary and Counter Matrixmentioning
confidence: 99%
“…DDoS attack is a serious threat to network stability and security due to a huge resource asymmetry between the network and the victim because the attacks usually come not only from multiple sources but also distributed geographically [49], [50], [51], [52].…”
Section: A Distributed Denial Of Services (Ddos) Attacksmentioning
confidence: 99%
“…This is to ensure that the attack can bypass security devices, and the targeted web server is collapsed and unable to serve a client’s request. DDoS attacks are executed at the network layer, which can be easily detected [ 23 ]. Due to this, the attacker opts to execute the attack at the application layer to make a web server turn to offline mode therefore incapable of responding to a client’s request [ 3 ].…”
Section: Ddos Attack Strategy At Application Layermentioning
confidence: 99%