DDoS attack detection using entropy-based features in network traffic has become a popular approach among researchers in the last five years. The use of traffic distribution features constructed using entropy measures has been proposed as a better approach to detect Distributed Denial of Service (DDoS) attacks compared to conventional volumetric methods, but it still lacks in the generality of detecting various intensity DDoS attacks accurately. In this paper, we focus on identifying effective entropy-based features to detect both high- and low-intensity DDoS attacks by exploring the effectiveness of entropy-based features in distinguishing the attack from normal traffic patterns. We hypothesise that using different entropy measures, window...
AbstractDistributed Denial of Service (DDoS) attacks are among the most severe threats in cyberspace...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss...
DDoS attack detection using entropy-based features in network traffic has become a popular approach ...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
In information theory, entropies make up of the basis for distance and divergence measures among var...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as sev...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
A community network often operates with the same Internet service provider domain or the virtual net...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as sev...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
High and low-intensity attacks are two common Distributed Denial of Service (DDoS) attacks that disr...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
The metric of entropy provides a measure about the randomness of data and a measure of information g...
AbstractDistributed Denial of Service (DDoS) attacks are among the most severe threats in cyberspace...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss...
DDoS attack detection using entropy-based features in network traffic has become a popular approach ...
Distributed Denial-of-Service (DDoS) attacks are a serious threat to the safety and security of cybe...
AbstractDenial of service attack and Distributed Denial of Service attacks are becoming an increasin...
In information theory, entropies make up of the basis for distance and divergence measures among var...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as sev...
Distributed Denial of Service (DDoS) is a cyber attack type involving multiple computer sources whic...
A community network often operates with the same Internet service provider domain or the virtual net...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as sev...
Early detection methods are required to prevent the DoS / DDoS attacks. The detection methods using ...
High and low-intensity attacks are two common Distributed Denial of Service (DDoS) attacks that disr...
Internet is widely spread in each corner of the world. With rapidly growing the use of computer reso...
The metric of entropy provides a measure about the randomness of data and a measure of information g...
AbstractDistributed Denial of Service (DDoS) attacks are among the most severe threats in cyberspace...
Software Defined Networking (SDN) is one of the most commonly used network architectures in recent y...
Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss...