2016
DOI: 10.1016/j.comnet.2016.05.004
|View full text |Cite
|
Sign up to set email alerts
|

A transparent and scalable anomaly-based DoS detection method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…To be more specific, IDSs are widely deployed in various distributed systems, perceiving the malicious intrusions and then taking rapid countermeasures to prevent further infections and spread. In general, IDSs can be classified into two major categories based on detection mechanisms: anomaly and misuse detection [42].…”
Section: Introductionmentioning
confidence: 99%
“…To be more specific, IDSs are widely deployed in various distributed systems, perceiving the malicious intrusions and then taking rapid countermeasures to prevent further infections and spread. In general, IDSs can be classified into two major categories based on detection mechanisms: anomaly and misuse detection [42].…”
Section: Introductionmentioning
confidence: 99%
“…This proposed system also addresses the problem of data shifts. In [40], the authors proposed a system that distributes the trac load among various trac processors for scalability. In [41], a detection and mitigation architecture is proposed.…”
Section: Sdn Basedmentioning
confidence: 99%
“…The main benefit of their system is that the effective identification and the detection of malware attacks. Joldzic et al (2016) presented a solution which is distributed and scalable for detecting the lower level DoS attacks which are affecting the regular services of network.…”
Section: Work On Cloud Securitymentioning
confidence: 99%
“…Authors did not use any soft computing approaches for making effective decisions over cluster head selection and attacks. In cloud security, Joldzic et al (2016) presented a solution for detecting the DoS attacks. Even though, they did not achieve best detection accuracy even concentrate with single attack.…”
Section: Comparative Analysismentioning
confidence: 99%