2011
DOI: 10.1109/tifs.2011.2107320
|View full text |Cite
|
Sign up to set email alerts
|

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
197
0
3

Year Published

2013
2013
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 330 publications
(218 citation statements)
references
References 23 publications
1
197
0
3
Order By: Relevance
“…Although Tsallis entropy seems to be more popular than Renyi entropy in the context of network anomaly detection the latter was also successfully applied in detection of different anomalies. An example is the work by Yang et al [10] who employed Renyi entropy to early detection of low-rate DDoS attacks and Kopylova et al [11] who reported positive results of using Renyi conditional entropy in detection of selected worms. We believe that with parameterized entropy some limitations of Shannon entropy caused by small descriptive capability [9] which results in a little ability to detect typical small or low-rate anomalies can be overcome.…”
Section: Detection Via Feature Distributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Although Tsallis entropy seems to be more popular than Renyi entropy in the context of network anomaly detection the latter was also successfully applied in detection of different anomalies. An example is the work by Yang et al [10] who employed Renyi entropy to early detection of low-rate DDoS attacks and Kopylova et al [11] who reported positive results of using Renyi conditional entropy in detection of selected worms. We believe that with parameterized entropy some limitations of Shannon entropy caused by small descriptive capability [9] which results in a little ability to detect typical small or low-rate anomalies can be overcome.…”
Section: Detection Via Feature Distributionsmentioning
confidence: 99%
“…Therefore, a proper network anomaly detection as one of possible solutions to complement signature-based solutions is essential. Recently, entropy-based methods which rely on network feature distributions has been of a great interest [6][7][8][9][10][11]. It is crucial to check if entropy-based approach is efficient in detection of anomalous network activities caused by modern botnet-like malware [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [50], authors focus on detection and traceback of low-rate DDoS attacks as they are very much like normal traffic and have more ability to conceal their attack related identities in the aggregate traffic. Two new information metrics are proposed (generalized entropy metric and information distance metric) to detect low-rate DDoS attacks.…”
Section: Traceback Schemesmentioning
confidence: 99%
“…Several malicious activities can be formed using Botnet like leakage of sensitive information etc. but one of the severe attacks is DDoS [21].…”
Section: Introductionmentioning
confidence: 99%