E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
Published 2016 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
E-LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric
Authors
Keywords
-
Journal
Security and Communication Networks
Volume 9, Issue 16, Pages 3251-3270
Publisher
Wiley
Online
2016-07-07
DOI
10.1002/sec.1530
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A multi-step outlier-based anomaly detection approach to network-wide traffic
- (2016) Monowar H. Bhuyan et al. INFORMATION SCIENCES
- Detection of known and unknown DDoS attacks using Artificial Neural Networks
- (2016) Alan Saied et al. NEUROCOMPUTING
- STONE: A streaming DDoS defense framework
- (2015) Vincenzo Gulisano et al. EXPERT SYSTEMS WITH APPLICATIONS
- An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection
- (2015) Monowar H. Bhuyan et al. PATTERN RECOGNITION LETTERS
- DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy
- (2014) Xinlei Ma et al. IEEE COMMUNICATIONS LETTERS
- Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions
- (2013) M. H. Bhuyan et al. COMPUTER JOURNAL
- DDoS Detection Algorithm Based on Preprocessing Network Traffic Predicted Method and Chaos Theory
- (2013) Yonghong Chen et al. IEEE COMMUNICATIONS LETTERS
- A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
- (2013) Wei Wei et al. IEEE COMMUNICATIONS LETTERS
- Analyzing well-known countermeasures against distributed denial of service attacks
- (2012) Hakem Beitollahi et al. COMPUTER COMMUNICATIONS
- Flow level detection and filtering of low-rate DDoS
- (2012) Changwang Zhang et al. Computer Networks
- Real time DDoS detection using fuzzy estimators
- (2012) Stavros N. Shiaeles et al. COMPUTERS & SECURITY
- RIHT: A Novel Hybrid IP Traceback Scheme
- (2012) Ming-Hour Yang et al. IEEE Transactions on Information Forensics and Security
- Distributed denial of service attack detection using an ensemble of neural classifier
- (2011) P. Arun Raj Kumar et al. COMPUTER COMMUNICATIONS
- Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
- (2011) Yang Xiang et al. IEEE Transactions on Information Forensics and Security
- Using whitelisting to mitigate DDoS attacks on critical Internet sites
- (2010) MyungKeun Yoon IEEE COMMUNICATIONS MAGAZINE
- Traceback of DDoS Attacks Using Entropy Variations
- (2010) Shui Yu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Controlling IP Spoofing through Interdomain Packet Filters
- (2008) Zhenhai Duan et al. IEEE Transactions on Dependable and Secure Computing
- Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks
- (2008) Yang Xiang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started