2019
DOI: 10.1016/j.inffus.2018.10.013
|View full text |Cite
|
Sign up to set email alerts
|

Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 77 publications
(52 citation statements)
references
References 21 publications
0
52
0
Order By: Relevance
“…Malicious network behaviors such as DDos and brute force attacks tend to be "mixed into" malicious traffic. Security researchers seek to effectively analyze the malicious traffic in a given network so as to identify potential attacks and quickly stop them [5][6][7][8]. [9], threshold analysis methods [10], and signature analysis methods [11].…”
Section: Related Workmentioning
confidence: 99%
“…Malicious network behaviors such as DDos and brute force attacks tend to be "mixed into" malicious traffic. Security researchers seek to effectively analyze the malicious traffic in a given network so as to identify potential attacks and quickly stop them [5][6][7][8]. [9], threshold analysis methods [10], and signature analysis methods [11].…”
Section: Related Workmentioning
confidence: 99%
“…Third, sketches lack capacity of tracing, which make this kind of methods take the risk of the false positive due to hash collisions. Jing et al [27], [28] proposed novel reversible sketch-based methods based on Chinese Remainder Theorem for collecting and storing network data. They used the compressed data to detect and mitigate amplification attacks and DDoS flooding attacks.…”
Section: Network Data Collectionmentioning
confidence: 99%
“…At present, many flow sampling algorithms have been proposed to guide data collectors to realize the restorable ability of flow distribution when the collected data is compressed. In addition, some algorithms [23], [27] reduce the redundant information of flows based on in-flow sampling. Packet sampling methods are time-sensitive data collection methods, which usually adjust collection strategies at time intervals.…”
Section: E Adaptive Traffic Collection Modulementioning
confidence: 99%
“…Researchers have studied DDoS attacks from different perspectives and proposed many approaches to detect and mitigate them [1], [3]- [6], [11]- [18]. Recent research interests have been more concentrated on AL-DDoS attack [2], [7], [19]- [30] for its harmfulness and concealment.…”
Section: Related Workmentioning
confidence: 99%