2009 Fifth International Conference on Information Assurance and Security 2009
DOI: 10.1109/ias.2009.280
|View full text |Cite
|
Sign up to set email alerts
|

Defending against UDP Flooding by Negative Selection Algorithm Based on Eigenvalue Sets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…By this analogy, packets that have the same identifier as previously detected DDOS-oriented packets are most likely to be a DDOS attack. In [17], the authors proposed a negative selection algorithm that aims to detect the legitimacy of a user based on a set of eigenvalues to resist a DDOS attack. All the aforementioned mechanism requires per-packet information such as packet identifier and IP/MAC addresses to effectively detect DDOS attacks which an attacker can manipulate.…”
Section: Related Work a Edge Computing Securitymentioning
confidence: 99%
“…By this analogy, packets that have the same identifier as previously detected DDOS-oriented packets are most likely to be a DDOS attack. In [17], the authors proposed a negative selection algorithm that aims to detect the legitimacy of a user based on a set of eigenvalues to resist a DDOS attack. All the aforementioned mechanism requires per-packet information such as packet identifier and IP/MAC addresses to effectively detect DDOS attacks which an attacker can manipulate.…”
Section: Related Work a Edge Computing Securitymentioning
confidence: 99%
“…A UDP flooding attack is a DoS mechanism that sends a large number of UDP packets to random ports on a remote host, causing the attacked system to be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients. This attack can be managed by deploying firewalls at key points in a network to filter unwanted network traffic [34,35]. Email attacks have become common crimes in cyberspace.…”
Section: Attacks On the Transport Layermentioning
confidence: 99%
“…The UDP, is an offline network protocol that provides data integrity check numbers and port numbers for addressing functions [26].…”
Section: ) the User Datagram Protocol (Udp) Flood Detectionmentioning
confidence: 99%