Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.1007/s11280-022-01040-3
|View full text |Cite
|
Sign up to set email alerts
|

A novel feature-based framework enabling multi-type DDoS attacks detection

Abstract: Distributed Denial of Service (DDoS) attacks are among the most severe threats in cyberspace. The existing methods are only designed to decide whether certain types of DDoS attacks are ongoing. As a result, they cannot detect other types of attacks, not to mention the even more challenging mixed DDoS attacks. In this paper, we comprehensively analyzed the characteristics of various types of DDoS attacks and innovatively proposed five new features from heterogeneous packets including entropy rate of IP source f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…Several studies have explored the use of ML models for DDoS attack detection. For example, In the previous study [2] on different types of DDoS attacks, and a novel approach was developed to detect them using five new features derived from heterogeneous packets. These features include the rate of entropy of IP source flow, packet size and number of unreachable packets of ICMP destination.…”
Section: Literature Surveymentioning
confidence: 99%
“…Several studies have explored the use of ML models for DDoS attack detection. For example, In the previous study [2] on different types of DDoS attacks, and a novel approach was developed to detect them using five new features derived from heterogeneous packets. These features include the rate of entropy of IP source flow, packet size and number of unreachable packets of ICMP destination.…”
Section: Literature Surveymentioning
confidence: 99%
“…Distributed Denial of Service (DDoS) attacks exist as one of the greatest threats to the Internet [1]. These attacks consume network resources by preventing the provision of regular services [2].…”
Section: Introductionmentioning
confidence: 99%
“…These attacks are intended to make the target server inaccessible by overwhelming its resources. These resources include the CPU, memory, and network bandwidth connections [1]. DDoS attacks have become commonplace and effective due to their efficiency and concealment [2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are several types of DDoS attacks that can be generated by attackers from anywhere. These attacks encompass ICMP flood, UDP flood, Ping of Death, Slowloris, Zero-day attack, Smurf, and TCP SYN flood [6]. In order to protect against DDoS attacks, a robust and effective detection strategy is crucial.…”
Section: Introductionmentioning
confidence: 99%