DDoS attack traffic is difficult to differentiate from legitimate network traffic during transit from the attacker, or zombies, to the victim. In this paper, we use the theory of network self-similarity to differentiate DDoS flooding attack traffic from legitimate self-similar traffic in the network. We observed that DDoS traffic causes a strange attractor to develop in the pattern of network traffic. From this observation, we developed a neural network detector trained by our DDoS prediction algorithm. Our preliminary experiments and analysis indicate that our proposed chaotic model can accurately and effectively detect DDoS attack traffic. Our approach has the potential to not only detect attack traffic during transit, but to also filter ...
Abstract: Distribution denial-of-service (DDoS) constitutes one of the major threats and among the h...
A community network often operates with the same Internet service provider domain or the virtual net...
Abstract: With the proliferation of Internet applications and network-centric services, network and ...
DDoS attack traffic is difficult to differentiate from legitimate network traffic during transit fro...
Abstract- A distributed denial-of-service (DDoS) attack is one in which a large number of compromise...
DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic p...
Abstract- DDoS attacks temporarily make the target system unavailable to the legitimate users. They ...
NoTraffic anomalies caused by Distributed Denial-of-Service (DDoS) attacks are major threats to both...
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an 'army' of c...
As more organizations and businesses in different sectors are moving to a digital transformation, th...
Distributed denial of service attacks has become a significant threat against Internet resources. Th...
The key objective of a Distributed Denial of Service (DDoS) attack is to compile multiple systems ac...
Cybersecurity attacks are becoming increasingly sophisticated and pose a growing threat to individua...
The paper discusses the concept and problem of identifying DDoS attacks for information management. ...
In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Ser...
Abstract: Distribution denial-of-service (DDoS) constitutes one of the major threats and among the h...
A community network often operates with the same Internet service provider domain or the virtual net...
Abstract: With the proliferation of Internet applications and network-centric services, network and ...
DDoS attack traffic is difficult to differentiate from legitimate network traffic during transit fro...
Abstract- A distributed denial-of-service (DDoS) attack is one in which a large number of compromise...
DDoS is a spy-on-spy game between attackers and detectors. Attackers are mimicking network traffic p...
Abstract- DDoS attacks temporarily make the target system unavailable to the legitimate users. They ...
NoTraffic anomalies caused by Distributed Denial-of-Service (DDoS) attacks are major threats to both...
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an 'army' of c...
As more organizations and businesses in different sectors are moving to a digital transformation, th...
Distributed denial of service attacks has become a significant threat against Internet resources. Th...
The key objective of a Distributed Denial of Service (DDoS) attack is to compile multiple systems ac...
Cybersecurity attacks are becoming increasingly sophisticated and pose a growing threat to individua...
The paper discusses the concept and problem of identifying DDoS attacks for information management. ...
In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Ser...
Abstract: Distribution denial-of-service (DDoS) constitutes one of the major threats and among the h...
A community network often operates with the same Internet service provider domain or the virtual net...
Abstract: With the proliferation of Internet applications and network-centric services, network and ...