Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cyberspace. In this paper we propose a novel metric to detect DDoS attacks in the Internet. More precisely, we use the function of order α of the generalized (Rényi) entropy to distinguish DDoS attacks traffic from legitimate network traffic effectively. In information theory, entropies make up the basis for distance and divergence measures among various probability densities. We design our abnormal-based detection metric using the generalized entropy. The experimental results show that our proposed approach can not only detect DDoS attacks early (it can detect attacks one hop earlier than using the Shannon metric while order &...
Distributed denial-of-service (DDoS) attacks are constantly evolving as the computer and networking ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
DDoS attack detection using entropy-based features in network traffic has become a popular approach ...
A community network often operates with the same Internet service provider domain or the virtual net...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as sev...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
The growing number of internet based services and applications along with increasing adoption rate o...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
© 2018 The primary innovations behind Software Defined Networks (SDN) are the decoupling of the cont...
Distributed denial-of-service (DDoS) attacks are constantly evolving as the computer and networking ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...
In information theory, entropies make up of the basis for distance and divergence measures among var...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
DDoS attack detection using entropy-based features in network traffic has become a popular approach ...
A community network often operates with the same Internet service provider domain or the virtual net...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as sev...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
The growing number of internet based services and applications along with increasing adoption rate o...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
© 2018 The primary innovations behind Software Defined Networks (SDN) are the decoupling of the cont...
Distributed denial-of-service (DDoS) attacks are constantly evolving as the computer and networking ...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Abstract- Many detection techniques against worms, denial of service attacks and botnets on the Inte...