2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) 2014
DOI: 10.1109/iccke.2014.6993385
|View full text |Cite
|
Sign up to set email alerts
|

An entropy-based VoIP flooding attacks detection and prevention system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…A similar approach that used Shannon entropy instead of HD for network traffic behavior analysis was proposed in [34]. They started with network traffic, free from attack, to create the required sketch table, and calculated the entropy over this structure to use as a comparison reference.…”
Section: Statistically Based Approachesmentioning
confidence: 99%
“…A similar approach that used Shannon entropy instead of HD for network traffic behavior analysis was proposed in [34]. They started with network traffic, free from attack, to create the required sketch table, and calculated the entropy over this structure to use as a comparison reference.…”
Section: Statistically Based Approachesmentioning
confidence: 99%
“…Two years later, Zargar et al [125] presented an anomaly-based approach to prevent and detect DoS attacks in SIP. The proposed approach builds over Entropy theory and makes use of a compressed summarized table of the packet data, i.e., a three-dimensional Sketch structure.…”
Section: Statistical Schemesmentioning
confidence: 99%