2007
DOI: 10.1007/978-3-540-77048-0_35
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack Detection Algorithms Based on Entropy Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 3 publications
0
16
0
Order By: Relevance
“…al. [71] propose an entropy based DDoS attack detection method that calculates the distribution pattern of the attributes in network packet headers. Cumulative entropy is calculated to monitor network traffic behavior for a period of time instead of classifying the traffic as abnormal after initially detecting as abnormal in the first phase.…”
Section: A Detection Approaches and Methodsmentioning
confidence: 99%
“…al. [71] propose an entropy based DDoS attack detection method that calculates the distribution pattern of the attributes in network packet headers. Cumulative entropy is calculated to monitor network traffic behavior for a period of time instead of classifying the traffic as abnormal after initially detecting as abnormal in the first phase.…”
Section: A Detection Approaches and Methodsmentioning
confidence: 99%
“…In the learning stage, the symmetry proportion is investigated in the system. [7] The edge for a consistent number of times, an assault will be accounted for. There are various confinements to this strategy.…”
Section: Related Workmentioning
confidence: 99%
“…The camouflage strategy for the address distribution is the same as that for the individual detection, whereas for the port distribution the attacker could use 0.052V 0 camouflage packets to change the entropy to the desired value as before, and then use the remaining 0.021V 0 packets to improve the port-camouflage further. In a similar way, the camouflage technique can be applied to other scenarios with more complex detection mechanisms such as in [5].…”
Section: Complex Detection Scenariosmentioning
confidence: 99%
“…Implicitly, it is assumed/believed that entropy will change noticeably when 'significant' changes in the traffic pattern occur due to anomalous behaviours, but change little or not at all when small fluctuations about typical behaviour are encountered. In this vein, [3,5] used entropy of source IP address distributions to capture DDoS attacks, and [10] focused on worm detection using distributions from packet headers. The paper [7] considered entropy of distributions based on the number IP addresses that each host communicates with in addition to those from packet headers.…”
Section: Introductionmentioning
confidence: 99%