2019 International Conference on Computing, Networking and Communications (ICNC) 2019
DOI: 10.1109/iccnc.2019.8685632
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…According to entropy theory, if one event is more likely to occur than another, then the amount of information that can be determined based on observations of that event is small [ 40 , 41 ]. Conversely, more information can be obtained by observing rare events [ 42 , 43 ]. Several approaches have been proposed to utilize the Shannon entropy or information entropy to understand the interaction between pedestrians and external conditions.…”
Section: Methodsmentioning
confidence: 99%
“…According to entropy theory, if one event is more likely to occur than another, then the amount of information that can be determined based on observations of that event is small [ 40 , 41 ]. Conversely, more information can be obtained by observing rare events [ 42 , 43 ]. Several approaches have been proposed to utilize the Shannon entropy or information entropy to understand the interaction between pedestrians and external conditions.…”
Section: Methodsmentioning
confidence: 99%
“…Paper [25] presented a novel network intrusion detection system using Shannon Entropy and traffic distributions of the source port. Paper [26] proposed a hybrid DDoS detection method, which integrates Kernel Online Anomaly Detection (KOAD), Shannon Entropy, and Mahalanobis Distance. In this study, Shannon Entropy is utilized with an online machine learning method to detect malicious traffic including DDoS attacks and Flash Event traffic.…”
Section: Entropy-based Technologiesmentioning
confidence: 99%
“…As the measure of uncertainty, entropy can be used to summarize feature distributions in a compact form [22]. ere are many forms of entropy, but only a few have been applied to network anomaly detection [23][24][25][26][27]. On this basis, we apply a Euclidean Distance-Based Multiscale Fuzzy Entropy (EDM-Fuzzy) algorithm which we proposed to detect abnormal network traffic as a useful supplement of other approaches.…”
Section: Introductionmentioning
confidence: 99%
“…They used a support vector machine (SVM) and two other statistical techniques, Shannon entropy and kernel online anomaly detection (KOAD). They found that Shannon entropy showed improved results when combined with the other two methods in recognizing DDoS attacks and flash events [ 24 ]. Ozcelik and Brooks reported a method called CUSUM-Entropy to detect DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%