2013 Proceedings of IEEE Southeastcon 2013
DOI: 10.1109/secon.2013.6567393
|View full text |Cite
|
Sign up to set email alerts
|

Development of an indicator to distinguish DDoS attacks from other anomalous events

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…The paper considers client puzzle protocol, ingress filtering, intrusion detection system and threshold value based systems' features and limitations to build its own system of detection of flooding DDOS attacks in cloud. The authors in [21] [26], [33], which includes perception layer, transportation layer and application layer. This has some contrast with respect to traditional networks especially in case of security domain.…”
Section: Review Studymentioning
confidence: 99%
See 2 more Smart Citations
“…The paper considers client puzzle protocol, ingress filtering, intrusion detection system and threshold value based systems' features and limitations to build its own system of detection of flooding DDOS attacks in cloud. The authors in [21] [26], [33], which includes perception layer, transportation layer and application layer. This has some contrast with respect to traditional networks especially in case of security domain.…”
Section: Review Studymentioning
confidence: 99%
“…Detection of such scenario is a problem to be solved in this research work. This must be done by a numerically stable algorithm so that anomaly detection [21] threshold is correctly identified for detection of adversity points during such slow HTTP based DDOS attacks in cloud environment.…”
Section: Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation