2018
DOI: 10.1007/978-3-030-05234-8_21
|View full text |Cite
|
Sign up to set email alerts
|

A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment

Abstract: Distributed Denial of Service (DDoS) has developed multiple variants, one of which is Distributed Reflective Denial of Service (DRDoS). With the increasing number of Internet of Things (IoT) devices, the threat of DRDoS attack is growing, and the damage of a DRDoS attack is more destructive than other types. The existing DDoS detection methods cannot be generalized in DRDoS early detection, which leads to heavy load or degradation of service when deployed at the final point. In this paper, we propose a DRDoS d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Karim et al [11] investigated the performance of Snort-based IDS on a network. Xu et al [12] proposed a deep forest-based distributed denial-of-service detection and defense model. They concentrate on attacks on smart nodes and the significant data context.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Karim et al [11] investigated the performance of Snort-based IDS on a network. Xu et al [12] proposed a deep forest-based distributed denial-of-service detection and defense model. They concentrate on attacks on smart nodes and the significant data context.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…When DRDoS attacks occur, network traffic patterns are analyzed by fuzzy association rules with path restriction. The DRDoS attacks' defensive architecture based on multi-agent (DAMA) is set up to realize the detection, orientation, and defensive function [27]. DAMA is validated using network simulator 2 (NS-2) platform to quickly detect the attack source, screen the attack source, and stop transmitting attack traffic.…”
Section: Ddos Detection-based Aimentioning
confidence: 99%