[go: up one dir, main page]

Yu et al., 2009 - Google Patents

Discriminating DDoS flows from flash crowds using information distance

Yu et al., 2009

View PDF
Document ID
18082913218064413340
Author
Yu S
Thapngam T
Liu J
Wei S
Zhou W
Publication year
Publication venue
2009 third international conference on network and system security

External Links

Snippet

Discriminating DDoS flooding attacks from flash crowds poses a tough challenge for the network security community. Because of the vulnerability of the original design of the Internet, attackers can easily mimic the patterns of legitimate network traffic to fly under the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Yu et al. Discriminating DDoS flows from flash crowds using information distance
Tao et al. DDoS attack detection at local area networks using information theoretical metrics
US9667589B2 (en) Logical / physical address state lifecycle management
Feily et al. A survey of botnet and botnet detection
Yu et al. Entropy-based collaborative detection of DDOS attacks on community networks
US12041079B2 (en) Detecting patterns in network traffic responses for mitigating DDOS attacks
US7469418B1 (en) Deterring network incursion
Alparslan et al. BotNet detection: Enhancing analysis by using data mining techniques
Kim et al. Real-time visualization of network attacks on high-speed links
US8819285B1 (en) System and method for managing network communications
Robinson et al. Evaluation of mitigation methods for distributed denial of service attacks
Jadhav et al. A novel approach for the design of network intrusion detection system (NIDS)
Behal et al. Signature-based botnet detection and prevention
Keshri et al. DoS attacks prevention using IDS and data mining
Yamada et al. Using abnormal TTL values to detect malicious IP packets
Seo et al. Abnormal behavior detection to identify infected systems using the APChain algorithm and behavioral profiling
Bijral et al. Study of Vulnerabilities of ARP Spoofing and its detection using SNORT
Subbulakshmi et al. A unified approach for detection and prevention of DDoS attacks using enhanced support vector machines and filtering mechanisms
Sonawane A survey of botnet and botnet detection methods
Behal et al. An experimental analysis for malware detection using extrusions
Manasrah et al. Detecting botnet activities based on abnormal DNS traffic
Tritilanunt et al. Entropy-based input-output traffic mode detection scheme for dos/ddos attacks
Mendes et al. Analysis of iot botnet architectures and recent defense proposals
Pahal et al. Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation
Panimalar et al. A review on taxonomy of botnet detection