2015 11th International Conference on Computational Intelligence and Security (CIS) 2015
DOI: 10.1109/cis.2015.105
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack Detection Using Flow Entropy and Clustering Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
22
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 8 publications
0
22
0
Order By: Relevance
“…K‐means clustering is one of the most used applied techniques within anomaly intrusion detection. Qin et al used an entropy‐based approach to identify values which then are used to model normal traffic flow through a k‐means clustering technique . Euclidean distance is used to identify the similarity between two entropy vectors and the weighted average radius of clusters is used to identify the number of required clusters.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…K‐means clustering is one of the most used applied techniques within anomaly intrusion detection. Qin et al used an entropy‐based approach to identify values which then are used to model normal traffic flow through a k‐means clustering technique . Euclidean distance is used to identify the similarity between two entropy vectors and the weighted average radius of clusters is used to identify the number of required clusters.…”
Section: Related Workmentioning
confidence: 99%
“…DF rate is defined as the detection rate divided by the false positive rate. This technique managed at best to achieve a DF rate of 7 …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Qin et al [8] identified a new approach for entropy-based DDoS attack detection. This method is divided into two parts.…”
Section: Related Workmentioning
confidence: 99%
“…However, signature methods are typically used for a limited number of protocols and do not allow real-time operation, which is critical when preparing un-targeted attacks. DDOS attack detection mechanisms based on machine learning use various classifiers [29,30] and deep neural networks [31] while analyzing various parameters, such as the distance between IP addresses [32], traffic entropy [33], intensity stream [34], and others. Machine learning methods tend to have high accuracy in detecting attacks.…”
mentioning
confidence: 99%