CHOOSING PARAMETERS FOR DETECTING DDOS ATTACK

被引:0
|
作者
Pu, Shi [1 ]
机构
[1] Neijiang Normal Univ, Network Management Ctr, Neijiang 641002, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP) | 2012年
关键词
DDoS; SYN flood; CUSUM; Pcap;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
DDoS attack has always been a major threat for information security. Realizing the complexity and difficulty in dest-end detection, researchers have switched their focus on "source-end detection". And CUSUM is considered an efficient method in source-end detection. However, there is no guidance about how to choose the parameters in CUSUM, which dramatically affect the performance of detections. So this article discusses and simulates the selection of these parameters, to provide reference for further research.
引用
收藏
页码:239 / 242
页数:4
相关论文
共 50 条
  • [1] Detecting bandwidth DDoS attack with control charts
    Santos, Anderson Fernandes P.
    Silva, Renato S.
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 252 - +
  • [2] A novel Approach for Detecting DDoS Attack in MANET
    Gautam, Divya
    Tokekar, Vrinda
    MATERIALS TODAY-PROCEEDINGS, 2020, 29 : 674 - 677
  • [3] Detecting DDoS Attack With Hilbert-Huang Transformation
    Zheng Kangfeng
    Wang Xiujuan
    Yang Yixian
    Guo Shize
    CHINA COMMUNICATIONS, 2011, 8 (02) : 126 - 133
  • [4] Detecting and Mitigating DDoS Attack in Named Data Networking
    Alhisnawi, Mohammad
    Ahmadi, Mahmood
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2020, 28 (04) : 1343 - 1365
  • [5] Detecting DDoS attack based on PSO Clustering algorithm
    Hao, Xiaohong
    Meng, Boyu
    Gu, Kaicheng
    PROCEEDINGS OF THE 2016 3RD INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING, MANUFACTURING TECHNOLOGY AND CONTROL, 2016, 67 : 670 - 674
  • [6] Detecting and Mitigating DDoS Attack in Named Data Networking
    Mohammad Alhisnawi
    Mahmood Ahmadi
    Journal of Network and Systems Management, 2020, 28 : 1343 - 1365
  • [7] Lifting the Smokescreen: Detecting Underlying Anomalies During a DDoS Attack
    Ricks, Brian
    Thuraisingham, Bhavani
    Tague, Patrick
    2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2018, : 130 - 135
  • [8] The Research of DDoS Attack Detecting Algorithm Based on the Feature of the Traffic
    Feng, Jiang
    Liu, Yuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4619 - +
  • [9] Detecting DDoS attack based on multi-class SVM
    School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China
    Dianzi Keji Diaxue Xuebao, 2008, 2 (274-277): : 274 - 277
  • [10] Detecting DDOS attack based on network self-similarity
    Xiang, Y
    Lin, Y
    Lei, WL
    Huang, SJ
    IEE PROCEEDINGS-COMMUNICATIONS, 2004, 151 (03): : 292 - 295