2012
DOI: 10.3837/tiis.2012.05.012
|View full text |Cite
|
Sign up to set email alerts
|

A DoS Detection Method Based on Composition Self-Similarity

Abstract: Based on the theory of local-world network, the composition self-similarity (CSS) of network traffic is presented for the first time in this paper for the study of DoS detection. We propose the concept of composition distribution graph and design the relative operations. The (R/S) d algorithm is designed for calculating the Hurst parameter. Based on composition distribution graph and Kullback Leibler (KL) divergence, we propose the composition self-similarity anomaly detection (CSSD) method for the detection o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…There are many techniques available to detect and mitigate DoS attacks in IP‐address‐based communications. They include from simple monitoring of traffic anomalies to highly advanced solutions using artificial intelligence, per‐flow‐based traffic analysis, and many more . Their applicability in CCN paradigm is yet to be checked according to its routing mechanism.…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…There are many techniques available to detect and mitigate DoS attacks in IP‐address‐based communications. They include from simple monitoring of traffic anomalies to highly advanced solutions using artificial intelligence, per‐flow‐based traffic analysis, and many more . Their applicability in CCN paradigm is yet to be checked according to its routing mechanism.…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…A slightly different perspective was wavelets-based analysis presented in Kaur et al 26 The test of selfsimilarity is conducted to differentiate between legitimate flash events and expanding DDoS attacks. In the same manner, another wavelet-based method for detecting outliers, such as DDoS attacks, in regards to LRD behavior of network traffic is presented in Zhang et al 27 In Jian-Qi et al, 28 the composition self-similarity anomaly detection (CSSD) of network traffic is presented for the detection of DoS attacks. Now, by merely monitoring the LRD behavior and self-similar property of network traffic, one could pick up network anomalies, as they would influence the deviation in such conditions.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reactive defenses, for example, , endeavor to curtail the attack and alleviate its impact on legitimate flows. In order to achieve this, they need to detect the attack as quickly as possible and to respond to it by dropping the malicious traffic it generates.…”
Section: Introductionmentioning
confidence: 99%