2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2011
DOI: 10.1109/imis.2011.82
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive DDoS Detector Design Using Fast Entropy Computation Method

Abstract: Recently, the threat of DDoS (Distributed Denial-of-Service) attacks is growing continuously and acquiring attacking tools via Internet is getting easy. One of the researches introduced a fast method to detect attacks using modified information entropy (so called Fast Entropy). Fast Entropy shows the significant reduce of computational time compared to conventional entropy computation while it maintains detection accuracy. However, Fast Entropy needs the manual threshold settings during detection process which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…An adaptive threshold is finally computed to detect anomalies within the traffic. The AFEA detector [6] is also based on similar techniques. Özçelik and Brooks [7] present a detector using the traffic headers entropy postprocessed with a wavelet filter and CUSUM to improve the detection accuracy.…”
Section: Statisticalmentioning
confidence: 99%
“…An adaptive threshold is finally computed to detect anomalies within the traffic. The AFEA detector [6] is also based on similar techniques. Özçelik and Brooks [7] present a detector using the traffic headers entropy postprocessed with a wavelet filter and CUSUM to improve the detection accuracy.…”
Section: Statisticalmentioning
confidence: 99%
“…FAEB scheme does so periodically based on the adopted time in the module's configuration by calculating entropy of overall requests through the following formulas [5055]: entropy=Pilog2Pi,Pi=uri_countstotal_counts. …”
Section: Flexible Collaborative Multilayer Ddos Prevention Frammentioning
confidence: 99%
“…Currently, authors often use a private method to do that with various means. In [19], [20], for instance, authors implement their proposed algorithm as simulation programs and run on desktop with a certain data sets for getting the four quantities. The detection mechanisms for SYN flooding were surveyed in [18].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers apply creatively various theories, such as calculating entropy in information theory [9], [10], [11], [12], data mining and artificial intelligent [13], [14], [15], [16], GT model in [26]. The performance of DDoS defense mechanisms were overall assessed by [17].…”
Section: Introductionmentioning
confidence: 99%