{"entities":{"Q980674":{"pageid":982522,"ns":120,"title":"Item:Q980674","lastrevid":65873931,"modified":"2026-04-12T05:57:18Z","type":"item","id":"Q980674","labels":{"en":{"language":"en","value":"Note on studying change point of LRD traffic based on Li's detection of DDoS flood attacking"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 5728528"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$858C9101-166E-4929-9202-C52BCDE6F972","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"b1b7a9f165ea5bc53b7834ba4a46be31f53c99f8","datavalue":{"value":{"text":"Note on studying change point of LRD traffic based on Li's detection of DDoS flood attacking","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q980674$1AFB1963-2D2D-48BD-B28D-18712DC64ADD","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"8fa275ac6a7ea946495c538d64f76d9437859fc9","datavalue":{"value":"1189.68024","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q980674$9154F3B7-7A7E-43C4-B625-F1540C0A8EA7","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"a42a34b88ae1a7ca1db988fa3755073a6123b0e6","datavalue":{"value":"10.1155/2010/962435","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q980674$48076B42-C8A1-4595-8086-A179CA152385","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"5fa45d99f6e355c9f5108bb55cad83111476d3e0","datavalue":{"value":{"entity-type":"item","numeric-id":980671,"id":"Q980671"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$D1F5B2D6-2433-4E5D-9D34-00DE275162F1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"5863983afef8f5cff8c16cde77c73de7fe5cc426","datavalue":{"value":{"entity-type":"item","numeric-id":980672,"id":"Q980672"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$1141E417-7794-40AA-8D06-5FD3D0B42A3A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"1a0d4c2d2652df885b7eb913e0f5420aa32877c9","datavalue":{"value":{"entity-type":"item","numeric-id":980673,"id":"Q980673"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$3C40EAE4-C054-4210-B45C-414ABA11C8A9","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"3dc97bc0aff607b9c22ce37ffa18b6de85001d90","datavalue":{"value":{"entity-type":"item","numeric-id":86199,"id":"Q86199"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$44D58225-D43E-45F5-A84B-7AC8BEA176AA","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"a3aa171d87a332eca777bbeb9a579cdbe78d6d13","datavalue":{"value":{"time":"+2010-06-29T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q980674$70AFF6B8-D6C6-413D-9EE9-8EE21F02953D","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"8c3f6c52d9d739cf03d96372547b87a6bf0aba16","datavalue":{"value":"https://eudml.org/doc/232150","type":"string"},"datatype":"url"},"type":"statement","id":"Q980674$2CEE8C20-671A-4323-9C46-02B0CC989E71","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"77329f52c26d60e6e8f8152ff1c70582deec3621","datavalue":{"value":"Summary: Distributed denial-of-service (DDoS) flood attacks remain great threats to the Internet. To ensure network usability and reliability, accurate detection of these attacks is critical. Based on Li's work on DDoS flood attack detection, we propose a DDoS detection method by monitoring the Hurst variation of long-range dependant traffic. Specifically, we use an autoregressive system to estimate the Hurst parameter of normal traffic. If the actual Hurst parameter varies significantly from the estimation, we assume that DDoS attack happens. Meanwhile, we propose two methods to determine the change point of Hurst parameter that indicates the occurrence of DDoS attacks. The detection rate associated with one method and false alarm rate for the other method are also derived. The test results on DARPA intrusion detection evaluation data show that the proposed approaches can achieve better detection performance than some well-known self-similarity-based detection methods.","type":"string"},"datatype":"string"},"type":"statement","id":"Q980674$31AAEE12-20FE-409C-83B7-44B4F01D80EE","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"bb3685facee6981d0664afe5afbdc986c78292cb","datavalue":{"value":"68M11","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q980674$131F3CF9-38C5-4512-B082-AA76AD78AF17","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"ca8c16691e9ec83d46a3995338b09d48ac9660ac","datavalue":{"value":"68M10","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q980674$BDF5E74E-9545-44A0-A07B-1E5A8B79A8A1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"324c182fa6009b8a0931eb0d449b845cbbb3125a","datavalue":{"value":"94A13","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q980674$67CC0DF8-CEAA-4F64-BDCE-215614320C64","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"ace03eab81fa30aa7edcd635a8b9529c3f366fbf","datavalue":{"value":"5728528","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q980674$4B8F5E29-44B3-47F4-B6E3-CA230EE8337D","rank":"normal"}],"P1463":[{"mainsnak":{"snaktype":"value","property":"P1463","hash":"2235fb1a93ae2392ebca437bbac3220f36cc23c3","datavalue":{"value":{"entity-type":"item","numeric-id":23163,"id":"Q23163"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$5BC1CBC0-FFCA-486B-8E99-D326824507F8","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$33FBEA54-BC35-4ADD-827B-45C9FFFFD9AC","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"82329f05c717ea26d3b74568ab5e704d90e10cab","datavalue":{"value":"W2102072018","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q980674$F24A3FF7-534E-49F8-8E35-3CEA46658F6F","rank":"normal"}],"P12":[{"mainsnak":{"snaktype":"value","property":"P12","hash":"33e5f8ab2ab73f2983e3c3a9a5cecabbd783d631","datavalue":{"value":"Q58653441","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q980674$3C4CA3D2-0052-4EF2-9E57-8CF5C0AA5466","rank":"normal"}],"P223":[{"mainsnak":{"snaktype":"value","property":"P223","hash":"de2cffee3112ed5a8f4a130408b0bc4fdb945222","datavalue":{"value":{"entity-type":"item","numeric-id":966330,"id":"Q966330"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$E597F889-E6B1-490E-A7A8-C0C1E4F62715","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"ca1f80e987ce9d1260bfb1472b6c8ef1d587bd2b","datavalue":{"value":{"entity-type":"item","numeric-id":966356,"id":"Q966356"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$14B992E1-DAC0-4979-94DB-7BB731FCDB20","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"4f2540bcd43aa9939a428eb936cc3c3bb301bfa1","datavalue":{"value":{"entity-type":"item","numeric-id":2456492,"id":"Q2456492"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$263C539E-A0BE-474D-9378-A64375438170","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"282cba379ced1b3c5a3b07dc1e1e8acc3c8c95f6","datavalue":{"value":{"entity-type":"item","numeric-id":1023231,"id":"Q1023231"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$50AA8275-C681-4CD7-8179-975C78E6E72A","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"c2e013a06aac003b277874aadf223da26793a027","datavalue":{"value":{"entity-type":"item","numeric-id":1023215,"id":"Q1023215"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$BF57F2CF-AA21-4CA8-A24C-1BBF54241F37","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"2d5190e29dddee406f20601dab50c700466ab7cd","datavalue":{"value":{"entity-type":"item","numeric-id":966357,"id":"Q966357"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$3AB0B3A0-142A-43E2-808E-196A1AE1B70F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"0a2f98b96a27fc8b3c79ea1ffd0c65a6514d6187","datavalue":{"value":{"entity-type":"item","numeric-id":966382,"id":"Q966382"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$1FE1781A-EB57-4169-BE8A-AE91146B67FB","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"16e17f530cc1251cf660e066754a6e2638420604","datavalue":{"value":{"entity-type":"item","numeric-id":966341,"id":"Q966341"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$CCDE88D8-B2EB-440C-8BD1-DE13AD481DEC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"326d771d33ffc1249a06015c5ad3951671b3296f","datavalue":{"value":{"entity-type":"item","numeric-id":4865042,"id":"Q4865042"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q980674$1083A632-FC54-453F-A54E-F147189E38D8","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"94b2633eed4aa8e89e3d025b586992059b19ae20","datavalue":{"value":{"entity-type":"item","numeric-id":1023231,"id":"Q1023231"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"efb4bc8889a3665a26622b3c15a808aa2c786ef3","datavalue":{"value":{"amount":"+0.80379319190979","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q980674$B5891B15-B236-4ACE-B291-0B95DE4FA50E","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"c3690e5d8de80c5da4bf70a55d4aeb059a9f8e07","datavalue":{"value":{"entity-type":"item","numeric-id":3557728,"id":"Q3557728"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"3e4c6296805217762dc8d37b5ddc228161dadf0b","datavalue":{"value":{"amount":"+0.7311125993728638","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q980674$DBBC4934-9A50-42F8-AC99-8D9929061FED","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"a01b654041246d481d83a6f7c485537187c8b967","datavalue":{"value":{"entity-type":"item","numeric-id":746229,"id":"Q746229"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"fd8d33e8d49faad37bad0d42ba7ad1551af55268","datavalue":{"value":{"amount":"+0.718783438205719","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q980674$6732F7DD-0283-4AE1-AC09-C36E564AEBA2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"6ab411a86f388f6ebf59a655bc85b9155cbba973","datavalue":{"value":{"entity-type":"item","numeric-id":2249310,"id":"Q2249310"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"5bd999e8df936252dfbd0220ab1c2d757d7e4584","datavalue":{"value":{"amount":"+0.7102116942405701","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q980674$C2F47A12-B1A5-4530-BCEA-5714BB069F1E","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"5b5bdfcce4ac786c40e2fb79a966a5a0fb2717fd","datavalue":{"value":{"entity-type":"item","numeric-id":5321712,"id":"Q5321712"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"15fcc09d96c1d55ce46b93525caf9b7608ac4592","datavalue":{"value":{"amount":"+0.7031473517417908","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q980674$1041B64C-90E1-4DC2-8DF9-2EF8D75D050D","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Note on studying change point of LRD traffic based on Li's detection of DDoS flood attacking","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Note_on_studying_change_point_of_LRD_traffic_based_on_Li%27s_detection_of_DDoS_flood_attacking"}}}}}