2008 IEEE International Conference on Communications 2008
DOI: 10.1109/icc.2008.321
|View full text |Cite
|
Sign up to set email alerts
|

A Principal Components Analysis-Based Robust DDoS Defense System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…It offers relatively high accuracy with a false-positive rate as low as 10% [15], [16], [17], [18], [19]. The computational demands of FTR depend on the filtering mechanism and the attack strength.…”
Section: B Dns Baa Countermeasuresmentioning
confidence: 99%
“…It offers relatively high accuracy with a false-positive rate as low as 10% [15], [16], [17], [18], [19]. The computational demands of FTR depend on the filtering mechanism and the attack strength.…”
Section: B Dns Baa Countermeasuresmentioning
confidence: 99%
“…A relatively high packet arrival rate or detection of unusually large sized packets can indicate presence of a BAA [15]. From the algorithms described in [29], [24], [18], [37], [16], [2], [35] we conclude that the filtering offers relatively high accuracy with false positives as low as 10%. Computational cost of FTR depends on the filtering mechanism and the attack strength.…”
Section: Countermeasures Against Dns Baamentioning
confidence: 99%
“…• Percentage deviation C 2 from desired attack probability: Every FTR algorithm [29], [24], [18], [37], [16], [2], [35] is characterized by specific values for the dp and fpp and it is not possible to achieve a zero attack probability for high-volume BAAs. Such a countermeasure can still be a cost-efficient solution if the attack probability is within an acceptable range.…”
Section: A Impact Of Baa On Dns and Dnssecmentioning
confidence: 99%
“…This can be achieved by pre-filtering the legitimate traffic with a throughput at line rate or higher before the traffic is sent to the RegEx detection system. In case of a DDoS attack [33], a DPI can detect the first few packets of an attack before large volume of attack arrives and the large volume of traffic can be handled by separate DDoS prevention systems such as [32,40]. Thus, having a pre-filter that can efficiently filter out legitimate traffic before the traffic reaches to the slower RegEx detection system can increase the overall DPI throughput without losing reliability of the DPI.…”
Section: Introductionmentioning
confidence: 99%