Proceedings of the 9th International Conference on Information Management and Engineering 2017
DOI: 10.1145/3149572.3149609
|View full text |Cite
|
Sign up to set email alerts
|

Mouse Features for DDoS Attacks Detection in the Application Layer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 59 publications
0
1
0
Order By: Relevance
“…The keystroke rhythms of a user, in terms of time, are measured to develop a unique biometric template of the user's typing pattern for future authentication. In [20] they evaluated the characteristics of the mouse to identify real users of DDOS attacks. Checking that the dynamism of the mouse provides unique characteristics to identify this type of attack.…”
Section: B User Dynamismmentioning
confidence: 99%
“…The keystroke rhythms of a user, in terms of time, are measured to develop a unique biometric template of the user's typing pattern for future authentication. In [20] they evaluated the characteristics of the mouse to identify real users of DDOS attacks. Checking that the dynamism of the mouse provides unique characteristics to identify this type of attack.…”
Section: B User Dynamismmentioning
confidence: 99%