2017 Chinese Automation Congress (CAC) 2017
DOI: 10.1109/cac.2017.8244075
|View full text |Cite
|
Sign up to set email alerts
|

Detect and identify DDoS attacks from flash crowd based on self-similarity and Renyi entropy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The following attacks have been considered: SYN Flood, Smurf, and UDP Flood. Use of Hurst coefficient and Rényi entropy has been investigated in Reference 13. Self‐similarity is checked using the Hurst coefficient to detect the onset of a network anomaly (DoS attack or flash crowd event).…”
Section: The Related Workmentioning
confidence: 99%
“…The following attacks have been considered: SYN Flood, Smurf, and UDP Flood. Use of Hurst coefficient and Rényi entropy has been investigated in Reference 13. Self‐similarity is checked using the Hurst coefficient to detect the onset of a network anomaly (DoS attack or flash crowd event).…”
Section: The Related Workmentioning
confidence: 99%
“…The authors of the article [21] used an autoregressive system for estimating the variance of the Hurst coefficient to detect changes in the flow. The use of self-similarity and Renyi entropy can be found in [22]. Fractal analysis is closely related to self-similarity; its application to detect attacks can be found in [23].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [16] used an autoregressive system for estimating the variance of the Hurst coefficient for the purpose of detecting changes in the flow. The research in [17] used self-similarity and Renyi entropy. The application of fractal analysis to detect attacks can be found in [18].…”
Section: Related Workmentioning
confidence: 99%