In information theory, entropies make up of the basis for distance and divergence measures among various probability densities. In this paper we propose a novel metric to detect DDoS attacks in networks by using the function of order α of the generalized (Rényi) entropy to distinguish DDoS attacks traffic from legitimate network traffic effectively. Our proposed approach can not only detect DDoS attacks early (it can detect attacks one hop earlier than using the Shannon metric while order α=2, and two hops earlier to detect attacks while order α=10.) but also reduce both the false positive rate and the false negative rate clearly compared with the traditional Shannon entropy metric approach.<br /
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, e...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to modern telecommunicati...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
DDoS attack detection using entropy-based features in network traffic has become a popular approach ...
A community network often operates with the same Internet service provider domain or the virtual net...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as sev...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
© 2018 The primary innovations behind Software Defined Networks (SDN) are the decoupling of the cont...
The growing number of internet based services and applications along with increasing adoption rate o...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, e...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to modern telecommunicati...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
DDoS attack detection using entropy-based features in network traffic has become a popular approach ...
A community network often operates with the same Internet service provider domain or the virtual net...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as sev...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
© 2018 The primary innovations behind Software Defined Networks (SDN) are the decoupling of the cont...
The growing number of internet based services and applications along with increasing adoption rate o...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
Network anomaly detection is a broad area of research. The use of entropy and distributions of traff...
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, e...
Today, the Internet allows virtually anytime, anywhere access to a seemingly unlimited supply of inf...
Distributed Denial-of-Service (DDoS) attacks represent a persistent threat to modern telecommunicati...