Yu et al., 2009 - Google Patents
Discriminating DDoS flows from flash crowds using information distanceYu et al., 2009
View PDF- Document ID
- 18082913218064413340
- Author
- Yu S
- Thapngam T
- Liu J
- Wei S
- Zhou W
- Publication year
- Publication venue
- 2009 third international conference on network and system security
External Links
Snippet
Discriminating DDoS flooding attacks from flash crowds poses a tough challenge for the network security community. Because of the vulnerability of the original design of the Internet, attackers can easily mimic the patterns of legitimate network traffic to fly under the …
- 230000003278 mimic 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu et al. | Discriminating DDoS flows from flash crowds using information distance | |
Tao et al. | DDoS attack detection at local area networks using information theoretical metrics | |
US9667589B2 (en) | Logical / physical address state lifecycle management | |
Feily et al. | A survey of botnet and botnet detection | |
Yu et al. | Entropy-based collaborative detection of DDOS attacks on community networks | |
US12041079B2 (en) | Detecting patterns in network traffic responses for mitigating DDOS attacks | |
US7469418B1 (en) | Deterring network incursion | |
Alparslan et al. | BotNet detection: Enhancing analysis by using data mining techniques | |
Kim et al. | Real-time visualization of network attacks on high-speed links | |
US8819285B1 (en) | System and method for managing network communications | |
Robinson et al. | Evaluation of mitigation methods for distributed denial of service attacks | |
Jadhav et al. | A novel approach for the design of network intrusion detection system (NIDS) | |
Behal et al. | Signature-based botnet detection and prevention | |
Keshri et al. | DoS attacks prevention using IDS and data mining | |
Yamada et al. | Using abnormal TTL values to detect malicious IP packets | |
Seo et al. | Abnormal behavior detection to identify infected systems using the APChain algorithm and behavioral profiling | |
Bijral et al. | Study of Vulnerabilities of ARP Spoofing and its detection using SNORT | |
Subbulakshmi et al. | A unified approach for detection and prevention of DDoS attacks using enhanced support vector machines and filtering mechanisms | |
Sonawane | A survey of botnet and botnet detection methods | |
Behal et al. | An experimental analysis for malware detection using extrusions | |
Manasrah et al. | Detecting botnet activities based on abnormal DNS traffic | |
Tritilanunt et al. | Entropy-based input-output traffic mode detection scheme for dos/ddos attacks | |
Mendes et al. | Analysis of iot botnet architectures and recent defense proposals | |
Pahal et al. | Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation | |
Panimalar et al. | A review on taxonomy of botnet detection |