2018
DOI: 10.3906/elk-1712-3
|View full text |Cite
|
Sign up to set email alerts
|

Threshold-based distributed DDoS attack detection in ISP networks

Abstract: Abstract:The purpose of this paper is to propose a more efficient and accurate distributed denial of service (DDoS) attack detection mechanism that detects DDoS attacks by monitoring the incoming traffic on the edge routers of ISP networks. It can be implemented as a module or agent function on the machine that is responsible for processing router

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 18 publications
(19 reference statements)
0
3
0
Order By: Relevance
“…The cloud-based detection is executed within the emulated remote cloud collecting traffic data from node R1. Two additional detection methods were implemented for evaluation purposes: Cosine Similarity [8] and Shannon's Entropy [6] [17]. Both detection strategies were adapted to use the metrics presented in Section II, and were selected considering their previous use in coarse-grained DDoS detection [6] [8].…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The cloud-based detection is executed within the emulated remote cloud collecting traffic data from node R1. Two additional detection methods were implemented for evaluation purposes: Cosine Similarity [8] and Shannon's Entropy [6] [17]. Both detection strategies were adapted to use the metrics presented in Section II, and were selected considering their previous use in coarse-grained DDoS detection [6] [8].…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Both detection strategies were adapted to use the metrics presented in Section II, and were selected considering their previous use in coarse-grained DDoS detection [6] [8]. Since a thresholding approach was adopted for all detection strategies, the methodology presented in [17] was used to optimize the threshold selection process and enhance the overall accuracy. To emulate an attack, we developed a Python script using the Scapy library 3 to generate spoofed source address and destination ports, targeting an arbitrary server within the remote cloud in Fig.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Later the target node can examine these packets to traceback the complete path used by the attacker [9]. Singh et al [10] suggested a thresholds and entropy based DDoS attack detection scheme that detects the presence of DDoS attack on the edge routers of stub networks. The detection mechanism was implemented in the form of agents that monitors the incoming traffic with the help of detection algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…The cloud-based detection is executed within the emulated remote cloud collecting traffic data from node R1. Two additional detection methods were implemented for evaluation purposes: Cosine Similarity [109] and Shannon's Entropy [107,118]. Both detection strategies were adapted to use the metrics presented in Section 6.1.1, and were selected considering their previous use in coarse-grained DDoS detection [107,109].…”
Section: Evaluation and Resultsmentioning
confidence: 99%
“…presented in [118] was used to optimize the threshold selection process and enhance the overall accuracy. To emulate an attack, we developed a Python script using the Scapy library 2 to generate spoofed source address and destination ports, targeting an arbitrary server within the remote cloud in Fig.…”
Section: Costmentioning
confidence: 99%