2014
DOI: 10.1002/dac.2805
|View full text |Cite
|
Sign up to set email alerts
|

Flow‐oriented detection of low‐rate denial of service attacks

Abstract: In this paper, an approach of detecting low-rate denial of service attack is proposed on the basis of principal component analysis algorithm. The proposed approach analyzes low-rate denial of service attack flows and handles complicated network flows by using principal component analysis algorithm to establish the network traffic matrix model, which is established on the basis of a large number of data acquisitions. Simulation results show that the proposed approach can predigest the high dimension vector, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Seven kinds of detection methods, spectral analysis [7], Kalman filtering [8], wavelet feature extraction [9], FIR filter [10], SEDP-based method [11], flow-oriented detection method [12], and adaptive KPCA, are compared, and results are listed in Table II.…”
Section: Comparison Of Some Detection Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Seven kinds of detection methods, spectral analysis [7], Kalman filtering [8], wavelet feature extraction [9], FIR filter [10], SEDP-based method [11], flow-oriented detection method [12], and adaptive KPCA, are compared, and results are listed in Table II.…”
Section: Comparison Of Some Detection Methodsmentioning
confidence: 99%
“…A flow-oriented LDoS attack detection method was proposed by Zhijun Wu et al [12]. Principal component analysis (PCA) algorithm was used to analyze Open Supervised Device Protocol matrix for detecting LDoS attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Traffic sampling techniques presently support a wide range of network tasks. As illustrated in Figure , examples of these tasks include the following: Network management – this involves short‐term, medium‐term, and long‐term planning and management of network operation, maintenance, and provisioning of network services ; Traffic engineering – this encompasses optimization of network performance, traffic characterization, traffic modeling, and control ; Performance evaluation – this involves evaluating the performance of management tools and protocols, fault tolerance, and network reliability ; Network security – this includes the detection of intrusion and anomalies, identification of botnets, and distributed denial of service attacks ; Service level agreement compliance – this implies the use of auditing tools for measuring and reporting service levels ; QoS control ‐ this involves measuring parameters such as packet delay and delay variation and loss . …”
Section: Related Workmentioning
confidence: 99%
“…Low‐rate denial of service (LDoS) attack is a new type of denial of service (DoS) attack, which exploits retransmission time out (RTO) mechanism of transmission control protocol. Different to DoS flooding attacks, LDoS attacks only send attack packets within a specific time interval at a relatively low rate.…”
Section: Introductionmentioning
confidence: 99%