2017 International Conference on Computer Science and Engineering (UBMK) 2017
DOI: 10.1109/ubmk.2017.8093526
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DDoS attack via deep packet analysis in real time systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Not only does it improve detection rates by monitoring scanners that indicate that an attack will happen, but it detects the protocol ports and identifies the different types of attacks. Özer and ˙Iskefiyeli [19] performed deep packet analysis in real-time systems to detect a DDoS attack. Firstly, their algorithm reads the packets and establishes a threshold value for the number of packets received from the same address.…”
Section: Related Work and Existing Toolsmentioning
confidence: 99%
“…Not only does it improve detection rates by monitoring scanners that indicate that an attack will happen, but it detects the protocol ports and identifies the different types of attacks. Özer and ˙Iskefiyeli [19] performed deep packet analysis in real-time systems to detect a DDoS attack. Firstly, their algorithm reads the packets and establishes a threshold value for the number of packets received from the same address.…”
Section: Related Work and Existing Toolsmentioning
confidence: 99%
“…However, RADAR can only detect 50% of attack data within 60 seconds of operation, and struggles to create an IoT defense system with accurate real-time classifications. Many other DPI systems [13]- [15] suffer from the same slow-down and lack of efficiency. To deal with the performance costs, periphery hardware for DPI acceleration or reduced efficiency is required.…”
Section: Related Workmentioning
confidence: 99%
“…The challenges being faced are in the areas of standardization, lack of agility, economic considerations, competing set of standards, lack of awareness. Various solutions based on packet-level analyses, flowlevel analyses, behavioral analyses, traffic mining and deep packet inspection of network traffic, have been proposed by researchers for combating DDoS attacks [6]- [11]. Recent advances in machine learning and deep learning techniques have also been employed for detection of DDoS attacks [12]- [14].…”
Section: Introductionmentioning
confidence: 99%