2019 International Russian Automation Conference (RusAutoCon) 2019
DOI: 10.1109/rusautocon.2019.8867618
|View full text |Cite
|
Sign up to set email alerts
|

Fractal Analysis based Detection of DoS/LDoS Network Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0
4

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 15 publications
0
5
0
4
Order By: Relevance
“…The use of self-similarity and Renyi entropy can be found in [22]. Fractal analysis is closely related to self-similarity; its application to detect attacks can be found in [23]. Authors in [24] deal with a combination of fractal and recurrent functions.…”
Section: Related Workmentioning
confidence: 99%
“…The use of self-similarity and Renyi entropy can be found in [22]. Fractal analysis is closely related to self-similarity; its application to detect attacks can be found in [23]. Authors in [24] deal with a combination of fractal and recurrent functions.…”
Section: Related Workmentioning
confidence: 99%
“…The research in [17] used self-similarity and Renyi entropy. The application of fractal analysis to detect attacks can be found in [18]. The authors in [19] dealt with a combination of fractal and recurrent functions.…”
Section: Related Workmentioning
confidence: 99%
“…These methods utilize different approaches in the process of estimation, and, as a result, the spectrum of the values can be wide. These statistical approaches are still used in the domain, e.g., R/S method [ 5 , 6 , 7 ], wavelet-method [ 8 ] and detrended fluctuation analysis [ 18 ]. In many studies, it has been proven that the wavelet-based technique gives the most reliable results [ 8 , 10 ].…”
Section: Related Workmentioning
confidence: 99%
“…Self-similarity and Long-Range Dependence (LRD) to this day are still relevant topics in the literature [ 4 , 5 , 6 ]. The analysis of these occurrences was recently applied to the attack detection domain [ 7 , 8 , 9 ]. The studies have proven that ignoring these phenomena has a negative effect on the estimation of performance measurements.…”
Section: Introductionmentioning
confidence: 99%