2018 IEEE SmartWorld, Ubiquitous Intelligence &Amp; Computing, Advanced &Amp; Trusted Computing, Scalable Computing &Amp; Commu 2018
DOI: 10.1109/smartworld.2018.00236
|View full text |Cite
|
Sign up to set email alerts
|

A Low-Rate DoS Attack Detection Method Based on Hilbert Spectrum and Correlation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The authors of [23][24][25][26][27][28][29][30][31][32] reported on wormholes in DDoS attacks, which are observed as a disaster for any kind of wireless and wired media. They had reported that this malicious activity can damage any kind of software and slow down the speed of any hardware and software by stealthily installing it while running in another program.…”
Section: Conflicts Of Interestmentioning
confidence: 99%
“…The authors of [23][24][25][26][27][28][29][30][31][32] reported on wormholes in DDoS attacks, which are observed as a disaster for any kind of wireless and wired media. They had reported that this malicious activity can damage any kind of software and slow down the speed of any hardware and software by stealthily installing it while running in another program.…”
Section: Conflicts Of Interestmentioning
confidence: 99%
“…The self-adaptability feature of the detection technique is prone to adapt to undetected attack traffic. On the other hand, Tang et al [36] combined Hilbert Spectrum and Pearson Correlation coefficient to detect LDDoS attack packets in a detection window of 20 s. Despite the benefits of simplicity and quick detection time, time-domain-based detection methods have lower detection rates than the other approaches.…”
Section: Time-domain Based Detectionmentioning
confidence: 99%
“…Periodic LDoS attack flows and normal network flows have different frequency domain features. Many detection methods based on frequency domain feature anomalies have been proposed [31][32][33]. For example, Chen et al [18] proposed to combine power spectrum analysis and information entropy to detect and mitigate LDoS attacks.…”
Section: The Anomaly-based Defense Strategymentioning
confidence: 99%