2020
DOI: 10.11591/ijece.v10i4.pp3651-3659
|View full text |Cite
|
Sign up to set email alerts
|

Detection of the botnets’ low-rate DDoS attacks based on self-similarity

Abstract: An article presents the approach for the botnets’ low-rate a DDoS-attacks detection based on the botnet’s behavior in the network. Detection process involves the analysis of the network traffic, generated by the botnets’ low-rate DDoS attack. Proposed technique is the part of botnets detection system – BotGRABBER system. The novelty of the paper is that the low-rate DDoS-attacks detection involves not only the network features, inherent to the botnets, but also network traffic self-similarity analysis, which i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 19 publications
0
7
0
2
Order By: Relevance
“…In order to evaluate the efficiency of the proposed approach the experiments were held. They were based on the usage of the BotGRABBER -cyberattacks' detection toolwas used [34][35][36][37][38].…”
Section: Methodsmentioning
confidence: 99%
“…In order to evaluate the efficiency of the proposed approach the experiments were held. They were based on the usage of the BotGRABBER -cyberattacks' detection toolwas used [34][35][36][37][38].…”
Section: Methodsmentioning
confidence: 99%
“…Solutions devoted to cyberattack detection against Internet of Things infrastructure are widely presented [7,8]. Quite possibly, the most encouraging approaches for IoT cyberattack detection are based on machine learning algorithms (MLA) [9][10][11][12][13].…”
Section: The State-of-the-artmentioning
confidence: 99%
“…It is a multi-vector protection system that can perform network and host activity analyses. The BotGRABBER framework presents the tool, not only for botnet detection but also to produce the needed security scenario of the network reconfiguration according to the type of cyberattack performed by the detected botnet [11,13,43]. The mentioned tool includes several units aimed at traffic collection, packet processing, feature extraction, feature classification based on machine learning algorithms, and producing results.…”
Section: Implementation Platformmentioning
confidence: 99%
“…This creates problems with the reliability of information storage. Therefore, researchers continue to develop a variety of detection methods and systems [18] - [25], which would detect malicious software at different stages of penetration into computer systems. This direction is actively developing and will continue to develop, because criminals benefit and therefore it motivates them.…”
Section: Subject Area Analysis and Related Decisionsmentioning
confidence: 99%