2014 23rd International Conference on Computer Communication and Networks (ICCCN) 2014
DOI: 10.1109/icccn.2014.6911829
|View full text |Cite
|
Sign up to set email alerts
|

Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Wen et al in [39] have combined anomaly detection with misuse detection to detect potential anomalies through the use of wavelet multi-resolution analysis and auto-correlation analysis. The obtained experimental results show that RoQ attacks were detected accurately with both low false positive and low false negative rates.…”
Section: Previous Methods For Detection Of Roq Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Wen et al in [39] have combined anomaly detection with misuse detection to detect potential anomalies through the use of wavelet multi-resolution analysis and auto-correlation analysis. The obtained experimental results show that RoQ attacks were detected accurately with both low false positive and low false negative rates.…”
Section: Previous Methods For Detection Of Roq Attacksmentioning
confidence: 99%
“…Advanced DDoS attacks may be classified as low-rate DoS/DDoS (also known as LDoS) attacks or as slow DoS/DDoS attacks. Low-rate DoS/DDoS attacks include Reduction of Quality (RoQ) attacks [38][39][40] at the network layer, Shrew attack [41][42][43] and the New-Shrew attack [44] at the transport layer, and LoRDAS attack (Low-Rate DoS attacks against Application Servers) [45,46] at the application layer.…”
Section: Introductionmentioning
confidence: 99%
“…Wen et al in [104] created a detection system divided into two stages. the first stage was to analyze suddenly anomalies in the collected traffic data.…”
Section: B Roq Attackmentioning
confidence: 99%
“…The online detection method is used to calculate the frequency of receiving RTS/CTS packets, however, off-line monitoring and big data statistic method should be considered with the rapid increase of wireless monitoring data volume. A two-stage DoS detection algorithm was proposed based on time-frequency signal analysis method [4]. In the first stage, network traffic is analysed through wavelet multi-resolution analysis method.…”
Section: Introductionmentioning
confidence: 99%