2008 International Conference on Computer Science and Software Engineering 2008
DOI: 10.1109/csse.2008.1069
|View full text |Cite
|
Sign up to set email alerts
|

Research on Method of Network Abnormal Detection Based on Hurst Parameter Estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The change in self-similarity occurs during the transition from normal traffic to one containing attacks. The Hust exponent was used to identify a DDoS attack in [16][17][18]. A comparison of average Hurst exponent values between standard and attacking traffic can be found in [19].…”
Section: Related Workmentioning
confidence: 99%
“…The change in self-similarity occurs during the transition from normal traffic to one containing attacks. The Hust exponent was used to identify a DDoS attack in [16][17][18]. A comparison of average Hurst exponent values between standard and attacking traffic can be found in [19].…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [13] compared the average Hurst values of normal and offensive traffic. The suitability of using the Hurst coefficient is also discussed in [14].…”
Section: Related Workmentioning
confidence: 99%