2022
DOI: 10.1016/j.future.2021.09.039
|View full text |Cite
|
Sign up to set email alerts
|

A new detection method for LDoS attacks based on data mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Ruchi Vishwakarma et al [10] present a honeypot-based approach that can be taken as a productive outset towards combatting Zero-Day DDoS Attacks to analyze ways to prevent SSH and Telnet Protocol Attacks [11]. Tang [12] proposed a detection method to identify LDOS attacks at the transport layer and used data mining technology to analyze network anomalies under LDOS attacks to complete the detection. Furthermore, because all of the aforementioned solutions target solely the ideal low-rate TCP DoS attack, one alternative strategy for attackers to circumvent the defense could be splitting their traffic into multiple attacking flows to trigger distributed DoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Ruchi Vishwakarma et al [10] present a honeypot-based approach that can be taken as a productive outset towards combatting Zero-Day DDoS Attacks to analyze ways to prevent SSH and Telnet Protocol Attacks [11]. Tang [12] proposed a detection method to identify LDOS attacks at the transport layer and used data mining technology to analyze network anomalies under LDOS attacks to complete the detection. Furthermore, because all of the aforementioned solutions target solely the ideal low-rate TCP DoS attack, one alternative strategy for attackers to circumvent the defense could be splitting their traffic into multiple attacking flows to trigger distributed DoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…H. Siadati et al used machine learning-based algorithms to identify anomalous logins within an enterprise network[129]. In[139], D. Tang et al developed data-driven models to detect relatively low-rate DoS attacks that exhibit abnormal patterns in the frequency, variation, and distribution of TCP flows.…”
mentioning
confidence: 99%