2012
DOI: 10.1109/tpds.2011.262
|View full text |Cite
|
Sign up to set email alerts
|

Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 182 publications
(89 citation statements)
references
References 16 publications
0
83
0
Order By: Relevance
“…For example, an anomaly characteristic of low-rate DDoS attacks is that every single packet forwarded in the network is legitimate since the packet's head information fulfills all legal requirements of the network-transmission protocols; however, the intentional aggregation of these packets at victim hosts by attackers exhibits abnormal statistical deviations [12]. In addition, as the low-rate DDoS packets are purposely created by prebuilt programs, the features of these packets are highly similar [13,14]. These features must affect the natural patterns in the normal network, which are usually random due to the complexity and dynamics of the real network [8].…”
Section: Detection Algorithmmentioning
confidence: 99%
“…For example, an anomaly characteristic of low-rate DDoS attacks is that every single packet forwarded in the network is legitimate since the packet's head information fulfills all legal requirements of the network-transmission protocols; however, the intentional aggregation of these packets at victim hosts by attackers exhibits abnormal statistical deviations [12]. In addition, as the low-rate DDoS packets are purposely created by prebuilt programs, the features of these packets are highly similar [13,14]. These features must affect the natural patterns in the normal network, which are usually random due to the complexity and dynamics of the real network [8].…”
Section: Detection Algorithmmentioning
confidence: 99%
“…DoS attacks & flash crowd attacks can both burden the server with their requests, but unlike DoS attacks which are legible malicious requests [7], flash attacks contains the rightful requests too. A flash is a supreme surge in traffic to a appropriate node in WSN introduce a effective increase in the load and putting stress on the node and its links, which may lead to failure of the complete path [13] [14].…”
Section: Relatedworkmentioning
confidence: 99%
“…Yu et al [9] proposed an algorithm to discriminate DDoS attacks from flash crowds by evaluating the flow correlation coefficient among suspicious flows. A covariance matrix-based approach was designed in [10] to extract the multivariate correlation for sequential samples.…”
Section: Multivariate Correlation Analysis (Mca)mentioning
confidence: 99%