Filters








115 Hits in 4.0 sec

Coherent Detection of Synchronous Low-Rate DoS Attacks

Zhijun Wu, Yue Yin, Guang Li, Meng Yue, Mamoun Alazab
2021 Security and Communication Networks  
Similar to the generation of receiving terminal phase dry detection code in spread spectrum communication, we construct a local detection sequence to complete the extraction of LDoS attack stream from  ...  In this paper, we observe the correlation of LDoS attacks and use coherence detection to detect LDoS attacks.  ...  Next, we will focus on how to detect a synchronous LDoS attack. e correlation of distributed LDoS pulse sequences is analyzed and a coherent detection method for LDoS attack is proposed.  ... 
doi:10.1155/2021/6694264 fatcat:7x6jjzoonjbijgldilymzks7ju

Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks

Dan Tang, Kai Chen, XiaoSu Chen, HuiYu Liu, Xinhua Li
2014 Mathematical Problems in Engineering  
For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time the accuracy of the current detection methods for LDoS attacks is relatively  ...  The NS2 simulations show that AEWMA method can detect LDoS attacks effectively and has a low false negative rate and a false positive rate.  ...  This will affect the detection accuracy for the LDoS attacks. In this paper, a new adaptive EWMA method is proposed on the basis of the EWMA method.  ... 
doi:10.1155/2014/496376 fatcat:wrxmm6dax5e6fb5zxmyjwx6w4u

A novel Low-rate Denial of Service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang Transformation and Trust Evaluation

Hongsong Chen, Caixia Meng, Zhiguang Shan, Zhongchuan Fu, Bharat K. Bhargava
2019 IEEE Access  
We have proposed a scalable LDoS attack detection architecture for both WSN and IoT.  ...  Low-rate Denial of Service (LDoS) attack is a special DoS attack.  ...  The intrusion detection method based on a self-adaptive dynamic trust threshold is described, which is suitable for cluster-based WSNs.  ... 
doi:10.1109/access.2019.2903816 fatcat:tyqzhcdda5hwhjzbfvfr6b3n3i

Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey

Wu Zhijun, Li Wenjing, Liu Liang, Yue Meng
2020 IEEE Access  
INDEX TERMS Low-rate Denial of Service attacks (LDoS), detection method, attack prevention system, defense mechanism.  ...  We classify the LDoS attacks and existing defense methods according to time domain and frequency domain in which detection and defense are performed.  ...  They studied a similar approach that detects LDoS attacks through collaborative detection and filtering.  ... 
doi:10.1109/access.2020.2976609 fatcat:v7aclbxt5bcfjk7uv7fwshgrxa

Half-Droptail: Algorithm to Mitigate LDoS Attacks

Jing Zhang, Hua Ping Hu, Bo Liu, Lin Chen
2011 Advanced Engineering Forum  
Low-Rate Denial-of-Service (LDoS) attack was a new type of denial-of-service attack, the queue management algorithm were found valuable to this attack, especially Droptail.  ...  In this paper, based on the impacts of the parameter setting of the Droptail on the LDoS attack, we proposed the Half-Droptail algorithm by changing parameter on the queue management algorithm.  ...  Compared with flooding attacks, LDoS attack was a low-rate attack, making the attack stream more subtle, which made the DoS attacks difficult to detect by traditional DoS detection methods.  ... 
doi:10.4028/www.scientific.net/aef.1.315 fatcat:myb5t6fq5rg77dh7avl3jobmp4

Detecting LDoS Attacks based on Abnormal Network Traffic

Kai Chen
2012 KSII Transactions on Internet and Information Systems  
a network for a long period.  ...  Traditionally, LDoS detecting methods mainly concentrate on the attack stream with feature matching, and only a limited number of attack patterns can be detected off-line with high cost.  ...  The CDF, as a distributed collaborative filtering detection method based on power spectral density, has a higher detection rate, but may spend a large number of storage resources for using three main tables  ... 
doi:10.3837/tiis.2012.07.007 fatcat:tb2qqohvlrc7hcxefwnejxzgw4

Defending Against LDoS Attacks Using Fair AQM

Bianqin Wang, Shunzheng Yu
2011 International Journal of Wireless and Microwave Technologies  
We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks.  ...  According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect.  ...  Acknowledgments We would like to acknowledge support for this work from the State Key Program of NSFC-Guangdong Joint Funds (U0735002), the National High Technology Research and Development Program of  ... 
doi:10.5815/ijwmt.2011.06.09 fatcat:djai7ybmnjgw7hmxb7ft7efeum

DDoS Attacks Detection and Prevention in Mobile Adhoc Network: A Survey

Ranjana Kumari, Achint Chugh
2018 International Journal of Emerging Research in Management and Technology  
The paper provides survey to DDoS attacks prevention and detection methods.  ...  Data packets routed between a sender node (source) and a receiver node (destination) of a MANET often traverse along a path spanning multiple links, which is known as the multihop path.  ...  The LDoS attacks may keep damaging the victim for a long time without being detected. DDoS oriented detection methods are no longer suitable for the detection of LDoS attacks.  ... 
doi:10.23956/ijermt.v7i1.20 fatcat:ftadh3kmnvdiziaxhumanbuptu

The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN

Liu Liang, Feng Wenzhi, Wu Zhijun, Yue Meng, Zhang Rudan
2020 IEEE Access  
By analyzing the characteristics of network traffic and CIFA model, a new CIFA detecting method based on the prediction error between particle filter and one-step prediction algorithm is proposed.  ...  Experimental analysis shows that the detection scheme in this paper has higher detection rate than the existing detection schemes.  ...  CONCLUSION In this paper, a new detection method for CIFA in NDN is proposed.  ... 
doi:10.1109/access.2020.3008723 fatcat:mbc6qc3ei5ci7oeh5czgkio2rm

Is low‐rate distributed denial of service a great threat to the Internet?

Ming Chen, Jing Chen, Xianglin Wei, Bing Chen
2021 IET Information Security  
Low-rate Distributed Denial of Service (LDDoS) attacks, in which the attackers send packets to a victim at a sufficiently low rate to avoid being detected, are considered to be a subtype of DDoS attacks  ...  In this backdrop, the authors aim to figure out what the conditions for launching a successful LDDoS attack are, and how harmful an attack could be.  ...  Since then, the working principle and detection/defence methods for LDoS attacks have gradually become a new topic in the field of network security.  ... 
doi:10.1049/ise2.12031 fatcat:o7c3qqckvrfbpmb2advvzqagfm

An Overview of DDOS Attacks Detection and Prevention in the Cloud

Khalid A. Fakeeh
2016 International Journal of Applied Information Systems  
In this paper, we conducted the survey on DDOS (Distributed Denial of Service) attacks research work and analyzed prevention and detection methods used for DDOS attacks in the cloud.  ...  We found that there is a good amount of research scope in detecting and preventing slow client application layer attacks in the cloud.  ...  Processing and memory overhead and Fails against Distributed LDOS Attack Periodic attack detection (PAD) and Modelled attack Detection Method (MAD) [18] IP to hop count method is used to detect spoofed  ... 
doi:10.5120/ijais2016451628 fatcat:navb5jsge5fwzb52dmwl7jbbwi

Intrusion Detection Systems in Clustering: A Review

Parmod Kumar
2017 International Journal for Research in Applied Science and Engineering Technology  
With popularization of internet, internet attack belongings are also increasing, thus information safety has became a important issue all over the world, Nowadays, it is an critical need to detect, identify  ...  and hold up such attacks effectively.  ...  The Intrusions Detection Systems prototype accurately classifies disturbances, normal control operation, and cyber-attacks for the distance security method for a twoline three-bus power transmission system  ... 
doi:10.22214/ijraset.2017.8322 fatcat:nzxn4kzeprapppgusxufwungby

Security Issues and Challenges on Wireless Sensor Networks

Muawia A. Elsadig, Imam Abdulrahman Bin Faisal University P.O. Box 1982, Dammam, Saudi
2019 International Journal of Advanced Trends in Computer Science and Engineering  
The paper concludes that security is the key to success for WSN applications, However, still many critical security problems are remained unsolved.  ...  Wireless Sensor Networks (WSNs) are emerging as a rich field of active research that is involved different aspects.  ...  In fact, the existing traditional intrusion detection methods are incapable to detect this attack; therefore, LDoS attack represents a real challenge for WSNs [27] .  ... 
doi:10.30534/ijatcse/2019/78842019 fatcat:hanvaheqjrhj5ozy645itc7lku

CPSS LR-DDoS Detection and Defense in Edge Computing Utilizing DCNN Q-Learning

ZengGuang Liu, XiaoChun Yin, Yuemei Hu
2020 IEEE Access  
Even more, it has a certain detection rate for unknown new attacks, which means the method is effective and suitable for the actual network environment.  ...  And then, we develop a novel intrusion detection and defense hybrid method for above CPSS LR-DDoS scenario in edge environment, which takes advantage of locality sensitive features extraction and Deep  ...  Thus, the aim of this paper is to present a novel DDoS detection method in edge environment with high detection accuracy, fast response time and a certain selflearning ability for unknown new attacks to  ... 
doi:10.1109/access.2020.2976706 fatcat:7azagv5yw5ddlcduwuwvf6aeiu

Secure Framework for DDoS Attack Detection and Defense in IEEE 802.11 WLAN

S. Suganthi, M. Aramudhan
2015 Research Journal of Applied Sciences Engineering and Technology  
In this study, we propose to design a detection and defense mechanism against DDoS attacks.  ...  This framework provides a complete solution for the DDoS attacks targeted at both clients and AP.  ...  Lina and Dongzhao (2009) have presented a research on attack model and principle of LDOS which can help us know the features of the attack and provide a basis for further research.  ... 
doi:10.19026/rjaset.10.1868 fatcat:vnpw22pybjbvjm5dbilog7pioa
« Previous Showing results 1 — 15 out of 115 results