2010
DOI: 10.3837/tiis.2010.06.014
|View full text |Cite
|
Sign up to set email alerts
|

Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router

Abstract: Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly, a new type of unidirectional flow called IF flow is proposed. Merits and features of IF flows are analyzed in detail and then two efficient methods are introduced in our DDoS attacks detection and evaluation scheme. The first method uses residual variance ratio to detect DDoS attacks after Recursive Least Square (RLS) filter is appli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…If the observed values number is N, then space complexity and time complexity are all O (N). (2) Step Ⅱmainly obtain the EWMA statistic series and MR series of ACK traffic. Based on Eq.…”
Section: Algorithm Complexitymentioning
confidence: 99%
See 1 more Smart Citation
“…If the observed values number is N, then space complexity and time complexity are all O (N). (2) Step Ⅱmainly obtain the EWMA statistic series and MR series of ACK traffic. Based on Eq.…”
Section: Algorithm Complexitymentioning
confidence: 99%
“…They disrupt the availability of a system or network by pressure of huge traffic. The challenge in detecting them is the need to deal with the huge traffic in networks [2], which makes the process of detection and prevention very difficult. The harm caused by a denial of service attack, both technologically and economically, cannot be eliminated for a long period after the attacks have ended.…”
Section: Introductionmentioning
confidence: 99%
“…The system can observe changes in cached DNS records, and applies machine learning to classify these updates as malicious or benign. Yan et al [26] proposed a new type of unidirectional flow called IF flow. They also introduced two efficient methods in their DDoS attacks detection and evaluation scheme.…”
Section: Related Workmentioning
confidence: 99%
“…As they require a large number of coordinated and communicating IDSs distributed over the network, however, they cannot be easily employed in the Internet. Similarly, router‐based DDoS attack detection mechanisms, for example, , require high cooperation from core routers and great changes in core network devices.…”
Section: Introductionmentioning
confidence: 99%