2020
DOI: 10.1016/j.jisa.2020.102457
|View full text |Cite
|
Sign up to set email alerts
|

T-CAD: A threshold based collaborative DDoS attack detection in multiple autonomous systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 18 publications
0
10
0
2
Order By: Relevance
“…In this section, the results of the proposed method for the proposed dataset are mentioned. After multiple performances for different time periods, with different values of the parameter α for different ∅-entropies in the range (2)(3)(4)(5)(6)(7)(8)(9)(10) and considering the values of r to calculate different thresholds for each α, in the range of (-5-5), using the floodlight controller module, different results were obtained; in Tables 2 and 3, the best values obtained in terms of detection accuracy, are listed for different time periods and are obtained separately for each dataset.…”
Section: Results Of the Experimentsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, the results of the proposed method for the proposed dataset are mentioned. After multiple performances for different time periods, with different values of the parameter α for different ∅-entropies in the range (2)(3)(4)(5)(6)(7)(8)(9)(10) and considering the values of r to calculate different thresholds for each α, in the range of (-5-5), using the floodlight controller module, different results were obtained; in Tables 2 and 3, the best values obtained in terms of detection accuracy, are listed for different time periods and are obtained separately for each dataset.…”
Section: Results Of the Experimentsmentioning
confidence: 99%
“…In paper [8] , a system called T-CAD is proposed to detect and reduce threshold-based DDoS attacks. This method calculates the entropy of router flows.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Serangan Distributed Denial of Services (DDoS) terus menjadi salah satu ancaman paling menantang ke Internet. Intensitas dan frekuensi serangan ini meningkat dengan kecepatan yang mengkhawatirkan [5] Begitu seringnya serangan DoS terjadi menyebabkan banyak peneliti yang melakukan penelitian tentang serangan DoS di antaranya yaitu serangan pada sistem fisik [9], survey dan mitigasi serangan DoS pada Named Data Networking [10], eksplorasi bukti digital pada smart router [11], mitigasi serangan DoS yang efisien [12], deteksi DoS pada penerapan jaringan sensor nirkabel [13], deteksi serangan DDoS berbasis multiple autonomous systems [14], dan DDoS bandwidth flooding [15].…”
Section: Pendahuluanunclassified
“…The primary target of DDoS attack is availability of resources for genuine users. The malicious flooding overloads the network, exceeding its bandwidth capabilities and disrupting the services [4]. The target range varies from financial institutions, health care providers and government agencies to low key public networks [2].…”
Section: Introductionmentioning
confidence: 99%