DDoS attack traffic is difficult to differentiate from legitimate network traffic during transit from the attacker, or zombies, to the victim. In this paper, we use the theory of network self-similarity to differentiate DDoS flooding attack traffic from legitimate self-similar traffic in the network. We observed that DDoS traffic causes a strange attractor to develop in the pattern of network traffic. From this observation, we developed a neural network detector trained by our DDoS prediction algorithm. Our preliminary experiments and analysis indicate that our proposed chaotic model can accurately and effectively detect DDoS attack traffic. Our approach has the potential to not only detect attack traffic during transit, but to also filter ...
In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Ser...
An article presents the approach for the botnets’ low-rate a DDoS-attacks detection based on the bot...
Abstract: Distribution denial-of-service (DDoS) constitutes one of the major threats and among the h...
DDoS attack traffic is difficult to differentiate from legitimate network traffic during transit fro...
Abstract- A distributed denial-of-service (DDoS) attack is one in which a large number of compromise...
DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic p...
Abstract- DDoS attacks temporarily make the target system unavailable to the legitimate users. They ...
NoTraffic anomalies caused by Distributed Denial-of-Service (DDoS) attacks are major threats to both...
As more organizations and businesses in different sectors are moving to a digital transformation, th...
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an 'army' of c...
The key objective of a Distributed Denial of Service (DDoS) attack is to compile multiple systems ac...
Distributed denial of service attacks has become a significant threat against Internet resources. Th...
Cybersecurity attacks are becoming increasingly sophisticated and pose a growing threat to individua...
A community network often operates with the same Internet service provider domain or the virtual net...
The paper discusses the concept and problem of identifying DDoS attacks for information management. ...
In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Ser...
An article presents the approach for the botnets’ low-rate a DDoS-attacks detection based on the bot...
Abstract: Distribution denial-of-service (DDoS) constitutes one of the major threats and among the h...
DDoS attack traffic is difficult to differentiate from legitimate network traffic during transit fro...
Abstract- A distributed denial-of-service (DDoS) attack is one in which a large number of compromise...
DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic p...
Abstract- DDoS attacks temporarily make the target system unavailable to the legitimate users. They ...
NoTraffic anomalies caused by Distributed Denial-of-Service (DDoS) attacks are major threats to both...
As more organizations and businesses in different sectors are moving to a digital transformation, th...
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an 'army' of c...
The key objective of a Distributed Denial of Service (DDoS) attack is to compile multiple systems ac...
Distributed denial of service attacks has become a significant threat against Internet resources. Th...
Cybersecurity attacks are becoming increasingly sophisticated and pose a growing threat to individua...
A community network often operates with the same Internet service provider domain or the virtual net...
The paper discusses the concept and problem of identifying DDoS attacks for information management. ...
In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Ser...
An article presents the approach for the botnets’ low-rate a DDoS-attacks detection based on the bot...
Abstract: Distribution denial-of-service (DDoS) constitutes one of the major threats and among the h...