2009
DOI: 10.3923/itj.2009.1180.1188
|View full text |Cite
|
Sign up to set email alerts
|

Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 2 publications
0
8
0
1
Order By: Relevance
“…Omni-directional sensing networks are typically used to achieve simple data acquisition, transmission and processing. Most study on deployment of omni-directional sensing model concentrated on the random deployment of target coverage [9], regional coverage deployment [10][11] and deterministic deployment [12]. For area deterministic deployment, it usually adopts normalized covering algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Omni-directional sensing networks are typically used to achieve simple data acquisition, transmission and processing. Most study on deployment of omni-directional sensing model concentrated on the random deployment of target coverage [9], regional coverage deployment [10][11] and deterministic deployment [12]. For area deterministic deployment, it usually adopts normalized covering algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Yan et al use a traffic matrix to represent network state, and use Renyi cross entropy to analyze matrix traffic and detect anomalies rather than Shannon entropy. The results show Renyi cross entropy based method can detect DDoS attacks at the beginning with higher detection rate and lower false rate than Shannon entropy based method [11]. Gu et al proposed an approach to detect anomalies in the network traffic using Maximum Entropy estimation and relative entropy [12].…”
Section: Introductionmentioning
confidence: 99%
“…, each V(t) is unitized to ( ) V t using(11) and(12); Secondly, the Shannon entropy can be calculated using(15). Its unitized form is( , ) V t n .…”
mentioning
confidence: 99%
“…For each combination of η base and n, the training data is analyzed in the following method. Firstly, each V(t) is unitized toV(t) using (11) and (12); Secondly, the Shannon entropy can be calculated using (14). Its unitized form isV(t, n).…”
Section: Entropy-based Attack Detectionmentioning
confidence: 99%
“…Renyi cross entropy based method can detect DDoS attacks at the beginning with higher detection rate and lower false rate than Shannon entropy based method [11]. Gu et al proposed an approach to detect anomalies in the network traffic using Maximum Entropy estimation and relative entropy [12].…”
Section: Introductionmentioning
confidence: 99%