2015
DOI: 10.1007/978-3-319-26561-2_45
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive DDoS-Event Detection from Big Darknet Traffic Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…For instance, figures 3 shows a typical DDoS attack and a typical scanning activity. We discovered that a darknet traffic pattern can be successfully described by the following 17 features related to the statistics of darknet packets [22]:…”
Section: Case Study: Darknet Analysis To Capture Malicious Cyber-attamentioning
confidence: 99%
“…For instance, figures 3 shows a typical DDoS attack and a typical scanning activity. We discovered that a darknet traffic pattern can be successfully described by the following 17 features related to the statistics of darknet packets [22]:…”
Section: Case Study: Darknet Analysis To Capture Malicious Cyber-attamentioning
confidence: 99%
“…[17]. Reference [14] discussed adaptive detection for DDoS event in darknet traffic. Reference [2] provided a longitudinal examination of scanning activities observed over 12.5 years.…”
Section: Related Workmentioning
confidence: 99%
“…The output types of iatmon (iatmon Src Type #) indicate: (0) TCP port scan; (1) UDP port scan; (2) TCP network scan; (3) UDP network scan; (4) ICMP only; (5) TCP one flow; (6) UDP one flow; (7) Backscatter; (8) 1 or 2 packets; (9) both TCP and UDP; (10) TCP unknown; (11) UDP unknown; (12) µTorrent; (13) Conficker P2P; (14) Unclassified. The numbers separated by the slash "/" in each cell represent the number of sources labeled by both the taxonomy and iatmon in dataset I and II, respectively.…”
Section: Comparison With Iatmonmentioning
confidence: 99%