Detection of variations of local irregularity of traffic under DDOS flood attack (Q1023231): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q4864256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4223206 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling autocorrelation functions of self-similar teletraffic in communication networks based on optimal approximation in Hilbert space / rank
 
Normal rank
Property / cites work
 
Property / cites work: Self-similar processes in communications networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4938041 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4865042 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4942158 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3327745 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4510169 / rank
 
Normal rank

Latest revision as of 15:19, 1 July 2024

scientific article
Language Label Description Also known as
English
Detection of variations of local irregularity of traffic under DDOS flood attack
scientific article

    Statements

    Detection of variations of local irregularity of traffic under DDOS flood attack (English)
    0 references
    0 references
    0 references
    11 June 2009
    0 references
    Summary: The aim of Distributed Denial-Of-Service (DDOS) flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H) to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn) is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references