Part 9: ATIMCNInternational audienceIn this paper, we propose a new approach of detecting a kind of Simple Mail Transfer Protocol Flooding Attack (SMTPFA for short) based on entropy measurement. We will calculate the entropy values from the received packets flow. Further checking its entropy value compared with the values of abnormal entropy, we then use it to detect this server whether is suffered some attacks from hacker. The scheme can easily detect SMTPFA, and monitor the real-time status of SMTP server
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
[[abstract]]It’s hard to block e-mail bombs as they were sent by normal SMTP(Simple Mail Transfer Pr...
Detecting massive network events like worm out-breaks in fast IP networks, such as Internet backbone...
[[abstract]]The aim of this study is to protect an electronic mail (email) server system based on an...
[[abstract]]In recent years, there have been many approaches proposed by many researchers to detect ...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
What happens when your implementation of SSL or some other cryptographic protocol is subverted throu...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
[[abstract]]It’s hard to block e-mail bombs as they were sent by normal SMTP(Simple Mail Transfer Pr...
Detecting massive network events like worm out-breaks in fast IP networks, such as Internet backbone...
[[abstract]]The aim of this study is to protect an electronic mail (email) server system based on an...
[[abstract]]In recent years, there have been many approaches proposed by many researchers to detect ...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
What happens when your implementation of SSL or some other cryptographic protocol is subverted throu...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
[[abstract]]It’s hard to block e-mail bombs as they were sent by normal SMTP(Simple Mail Transfer Pr...
Detecting massive network events like worm out-breaks in fast IP networks, such as Internet backbone...