2011 International Conference on Electrical and Control Engineering 2011
DOI: 10.1109/iceceng.2011.6057035
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attack detection algorithm based on the correlation of IP address analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…The correlation value of cluster B remains stable, whereas the values of the correlation of cluster A decline. Since attacking clients have a declining value of correlation [18] and normal clients have an almost stable value of correlation [18], we conclude that cluster A consists of attacking clients and cluster B consists of legitimate clients. We further analysed the inter-arrival time of cluster A by using the normal probability plot as shown in Figure 4.…”
Section: Attack Detection Methodsmentioning
confidence: 80%
“…The correlation value of cluster B remains stable, whereas the values of the correlation of cluster A decline. Since attacking clients have a declining value of correlation [18] and normal clients have an almost stable value of correlation [18], we conclude that cluster A consists of attacking clients and cluster B consists of legitimate clients. We further analysed the inter-arrival time of cluster A by using the normal probability plot as shown in Figure 4.…”
Section: Attack Detection Methodsmentioning
confidence: 80%
“…The approach based on the correlation of the attacker's and the target server's IP addresses is very simple, as it only compares non-uniformity in the IP addresses. This makes the approach record excellent accuracy for attack detection, as noted in the research studies in [55][56][57][58]. This is not the case with modern attack strategies, where the same IP address can be used to launch attacks.…”
Section: Key Findings and Discussionmentioning
confidence: 99%
“…However, because it must constantly communicate with the source side, there is a significant increase in traffic. In Wang and Wang [56], network traffic distribution was analysed, and IP address correlation-based non-uniformity was found. The amount of IP data packets throughout a period was determined in this study, and the amount of data packets in a sliding window was approximated.…”
Section: Correlation Of Ip Addressmentioning
confidence: 99%
“…LR-DDoS attack is widely used in a large size DDoS attack, which joins several low rate attacks, such as a Botnet to initiate a low rate DDoS attack. LR-DDoS attack produces network traffic similar to the normal network traffic, and, therefore, it is difficult to be detected and mitigated [2, 10, 15]. …”
Section: Introductionmentioning
confidence: 99%
“…A high rate distributed denial of service (HR-DDoS) attack is a synonym for the traditional DDoS attacks when attackers exceed and violate the adopted threshold value [15, 16]. …”
Section: Introductionmentioning
confidence: 99%