2016
DOI: 10.3390/e18100350
|View full text |Cite
|
Sign up to set email alerts
|

Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

Abstract: Distributed denial-of-service (DDoS) attack is one of the major threats to the web server. The rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in current intrusion detection systems or intrusion prevention systems (IDS/IPS), mostly caused by application-layer DDoS attacks. Within this context, the objective of the paper is to detect a DDoS attack using a multilayer perceptron (MLP) classification algorithm with genetic algorithm (GA) as learning algorithm. In this work, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(11 citation statements)
references
References 28 publications
0
9
0
Order By: Relevance
“…On the other hand, information theory-based metrics play a significant role in the detection of DoS attacks due to their low computation overhead [15]. During a DoS attack, entropy values decrease significantly [16].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, information theory-based metrics play a significant role in the detection of DoS attacks due to their low computation overhead [15]. During a DoS attack, entropy values decrease significantly [16].…”
Section: Introductionmentioning
confidence: 99%
“…Most of the analytical models used to minimize the error function use methods that require the evaluation of the local gradient of the E ( W ) function and techniques based on second-order derivatives can also be considered [ 23 , 24 ].…”
Section: Neural Network Methodsmentioning
confidence: 99%
“…Given the binning function described above, the key idea is to build the DT using the Kronecker product, assuming we have an input instance x ∈ R D with D characteristics. Associating each characteristic x d with its own NN f d (x d ), we can determine all the final nodes of the DT, in line with Equation (23).…”
Section: Deep Neural Decision Trees (Dndt)mentioning
confidence: 99%
“…The other study [16] proposed a distributed denial-of-service (DDoS) attack detection mechanism on the big data situation. The studies [17,18] also proposed the entropy-based DDoS attack measurement on packet size interval and the method to locate the potential DDoS attack by the SDN network. Most of the studies mentioned above also tried to detect the cyber-attacks on IoT.…”
Section: Related Workmentioning
confidence: 99%