2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS) 2020
DOI: 10.23919/apnoms50412.2020.9237014
|View full text |Cite
|
Sign up to set email alerts
|

Improving Performance of Collaborative Source-Side DDoS Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…At this time, in order to reduce computing resources in IDRS, it is necessary to use the network traffic volume instead of packet sampling for detecting DDoS attacks. Yeom et al proposed a collaborative source-side attack detection method to more accurately detect DDoS attack in multiple networks, taking into account the detection performance in different time zones [23]. This method detects DoS attacks by applying a margin to the adaptive threshold at each source-side, and shares the detection results and the weights which represent the performance of each source-side attack detection.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…At this time, in order to reduce computing resources in IDRS, it is necessary to use the network traffic volume instead of packet sampling for detecting DDoS attacks. Yeom et al proposed a collaborative source-side attack detection method to more accurately detect DDoS attack in multiple networks, taking into account the detection performance in different time zones [23]. This method detects DoS attacks by applying a margin to the adaptive threshold at each source-side, and shares the detection results and the weights which represent the performance of each source-side attack detection.…”
Section: Related Workmentioning
confidence: 99%
“…Also, the performance of source-side attack detection methods may be different depending on the network characteristics located on multiple regions [18], [19]. In order to improve the performance of source-side attack detection method, the collaborative attack detection methods which share attack detection result between source-side network of multiple regions are studied [20]- [23]. These methods calculate value that represent the performance of each site and these values are used to determine whether the attack is detected with the detection results of each site.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, to analyze the classification of online detection, new evaluation indicators are defined: false intervention degree and malicious congestion revealing degree used to evaluate an online detection of normal and malicious traffic, respectively. Among them, the false interception rate represents the proportion of misjudging regular traffic as diverse kinds of minimal-degree DDoS assaults, and the calculation is shown in (1); the malicious traffic detection rate represents the proportion of detected malicious traffic to the overall count of negative traffic samples, and the calculation is shown in formula (2).…”
Section: Evaluation Indicatorsmentioning
confidence: 99%
“…ere are low-rate/ minimal DDoS assaults of many protocols in the network environment as well as periodic and aperiodic attack methods [1]. As a result, effectively identifying many forms of minimal DDoS assault traffic is an important challenge that must be addressed.…”
Section: Introductionmentioning
confidence: 99%