2009 Third International Conference on Multimedia and Ubiquitous Engineering 2009
DOI: 10.1109/mue.2009.60
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis

Abstract: Abstract:In Distributed Denial-of-Service (DDoS) Attack, an attacker breaks into many innocent computers (called zombies). Then, the attacker sends a large number of packets from zombies to a server, to prevent the server from conducting normal business operations. We design a DDoS-detection system based on a decision-tree technique and, after detecting an attack, to trace back to the attacker's locations with a traffic-flow pattern-matching technique. Our system could detect DDoS attacks with the false positi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
2

Year Published

2013
2013
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 18 publications
0
14
0
2
Order By: Relevance
“…All of the traceback mechanisms have serious deployment and operational challenges [69]. One of the fundamental deployment and operational challenges is ensuring a sufficient number of routers that support traceback before it is effective.…”
Section: Destination-based Mechanismsmentioning
confidence: 99%
“…All of the traceback mechanisms have serious deployment and operational challenges [69]. One of the fundamental deployment and operational challenges is ensuring a sufficient number of routers that support traceback before it is effective.…”
Section: Destination-based Mechanismsmentioning
confidence: 99%
“…Grey Rational Analysis and Decision Tree Methods [15] Traffic Strength is analyzed by creating decision trees. Upstream Router's traffic flow is analyzed, and the decision tree is created.…”
Section: Figure30 "Low Rate Ddos Time Diagram"mentioning
confidence: 99%
“…It is a common method for DDoS detection in [22], [23], [24].Some common algorithms in network intrusion and anomaly detection are Multilayer Perceptron, Gaussian Classifier, K-means Clustering and Markov model [25].…”
Section: Related Workmentioning
confidence: 99%
“…The common principle of destination-based defense mechanisms is to look for a special signature which reflects actual DDoS attacks at early stage. Variety of theories have been applied to build destination-based defense mechanisms, such as using entropy in information theory [9], [10], [11], [12], game theory model in [17],artificial intelligent, learning machine, data mining [13], [14], [15], [16].…”
Section: Introductionmentioning
confidence: 99%