Filters








194 Hits in 6.6 sec

Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics

Amit Kulkarni, Stephen Bush
<span title="">2006</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3izr2b7idfhjrp7ojmgew3mlbm" style="color: black;">Journal of Network and Systems Management</a> </i> &nbsp;
This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of information theory, specifically Kolmogorov complexity.  ...  The proposed algorithm exploits this feature to correlate traffic flows in the network and detect possible denial-of-service attacks.  ...  Acknowledgments The work discussed in this paper was funded by DARPA, under the auspices of the Fault Tolerant Networks program.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10922-005-9016-3">doi:10.1007/s10922-005-9016-3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bogha3b5c5dwfl5xoo4skmox74">fatcat:bogha3b5c5dwfl5xoo4skmox74</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20030807164813/http://www.crd.ge.com:80/~bushsf/ftn/2001crd176.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a3/45/a345e81da0d1034d44cbb4a4d691bfaab74a08b8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10922-005-9016-3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Comparative Study of Defense Mechanisms against SYN Flooding Attack

Prathibha R.C, Rejimol Robinson R R
<span title="2014-07-18">2014</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
A SYN flood is a form of denial-of-service attack.  ...  Distributed Denial-of-Service (DDoS) flooding attacks are a serious threat to the security of the internet. A DDoS attack makes a machine or network resources not usable by the legitimate clients.  ...  The Distributed Denial of Service (DDoS) attack exploits the client/server technology, combine it with multiple computers to use them as an attack platform, and the service is denied for one or several  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/17282-7414">doi:10.5120/17282-7414</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3watu25dpjeflo3but5lywayhu">fatcat:3watu25dpjeflo3but5lywayhu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720061704/https://research.ijcaonline.org/volume98/number18/pxc3897414.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a7/60/a760a86136052accc6c83ee674a9277b952ff750.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/17282-7414"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing Environment

Anteneh Girma, Moses Garuba, Jiang Li, Chunmei Liu
<span title="">2015</span> <i title="IEEE"> 2015 12th International Conference on Information Technology - New Generations </i> &nbsp;
One of the major sophisticated threats that happen to be very difficult and challenging to counter due to its distributed nature and resulted in cloud service disruption is Distributed Denial of Service  ...  Even though there are number of intrusion detection solutions proposed by different research groups, and cloud service providers (CSP) are currently using different detection solutions by promising that  ...  An approach described based on fundamentals of information theory specifically Kolmogorov complexity to detecting distributed denial of service (DDoS) attacks was proposed.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/itng.2015.40">doi:10.1109/itng.2015.40</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zspnvjtn75a4dfrfv66tcf2g44">fatcat:zspnvjtn75a4dfrfv66tcf2g44</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170428041224/http://tarjomefa.com:80/wp-content/uploads/2017/04/6441-English-TarjomeFa.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4b/1c/4b1cf8bb3b2cc2f392c6dcb4c58dc1d115970b28.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/itng.2015.40"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning [chapter]

Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jung
<span title="">2003</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers.  ...  Based upon the calculation of TCP flag rates, we compile a pair of the TCP flag rates and the presence (or absence) of the DDoS attack into state-action rules using machine learning algorithms.  ...  Introduction As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) attacks [2] , [6] , [10] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-45080-1_38">doi:10.1007/978-3-540-45080-1_38</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bwg7fbg62zct5ejao24omlusrm">fatcat:bwg7fbg62zct5ejao24omlusrm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812105129/http://rise.cse.iitm.ac.in/wiki/images/2/2b/ML9.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fb/12/fb12ed1b38fc0a48f5423830e6e953740cd1538a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-45080-1_38"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Multivariate Control Chart for the Detection of MAC Layer Misbehavior in Mobile ad Hoc Networks

Mohammed-Alamine El Houssaini, Abdessadek Aaroud, Ali El Hore, Jalel Ben-Othman
<span title="">2016</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cx3f4s3qmfe6bg4qvuy2cxezyu" style="color: black;">Procedia Computer Science</a> </i> &nbsp;
The share nature of the transmission channel in IEEE 802.11 makes the network vulnerable to several attacks like the MAC layer misbehavior which can be similar to denial of service attack.  ...  In this paper, we suggest a novel detection scheme of such attack using a multivariate control chart currently exist in industrial management with a large success.  ...  This performance deterioration can be like a denial of service attack 3 . Furthermore, the need of a detection scheme becomes an emergency.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2016.04.099">doi:10.1016/j.procs.2016.04.099</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f6wjuhr6g5guhlpgghqikb7b54">fatcat:f6wjuhr6g5guhlpgghqikb7b54</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170926023653/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/354/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMTg3NzA1MDkxNjMwMTIyMw%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3c/4a/3c4aaacf02f60b7d3d6c3574525f483fa2b2a1b9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2016.04.099"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Low-rate DDOS Attack Detection using Optimal Objective Entropy Method

Poonam N.Jadhav, B. M. Patil
<span title="2013-09-18">2013</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
A Distributed Denial of Service (DDOS) attack is a type of Internet attack that disrupts the normal function of the targeted computer network (server).  ...  Several efforts had made in detection and computation of the DDOS attacks over network, where IDS (Intrusion detection systems) are unable to isolate the normal flow of traffic from attacks.  ...  These characteristics have led the growth of the Internet, whereas vulnerabilities in the network has occurred simultaneously [1] .Now days, the threat of Distributed Denial of Service (DDoS) attacks  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/13472-1147">doi:10.5120/13472-1147</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xcyj2z3hzzb37kwbzwtt5eas4y">fatcat:xcyj2z3hzzb37kwbzwtt5eas4y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180723152317/https://research.ijcaonline.org/volume78/number3/pxc3891147.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/2b/d52bfaf75728f082ed107cbb58af302333355fa3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/13472-1147"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A novel Low-rate Denial of Service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang Transformation and Trust Evaluation

Hongsong Chen, Caixia Meng, Zhiguang Shan, Zhongchuan Fu, Bharat K. Bhargava
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
Low-rate Denial of Service (LDoS) attack is a special DoS attack.  ...  than 0.4, the IMF component is identified as high trust IMF components that will be used to detect LDoS attack.  ...  There are many types of DoS attacks in the WSN, such as Denial of sleep, Distributed Denial of Service, Low-rate Denial of Service, Routing flood, SYN flood [1] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2903816">doi:10.1109/access.2019.2903816</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tyqzhcdda5hwhjzbfvfr6b3n3i">fatcat:tyqzhcdda5hwhjzbfvfr6b3n3i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210428193147/https://ieeexplore.ieee.org/ielx7/6287639/8600701/08663272.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a5/1c/a51ce301272cb1ce250f598e44fd05fc4de6241f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2903816"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Systematic review of aspects of DDoS attacks detection

Silvia Bravo, David Mauricio
<span title="2019-04-01">2019</span> <i title="Institute of Advanced Engineering and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/trvfti3jm5hnxhei7rl7owpcqq" style="color: black;">Indonesian Journal of Electrical Engineering and Computer Science</a> </i> &nbsp;
Distributed Denial of Service attacks (DDoS) are one of the biggest problems facing the Internet.  ...  It has been concluded that an adequate analysis of the above aspects of detection of DDoS attacks can make a useful contribution to designing an appropriate strategy for neutralizing the attacks.  ...  Later, a more sophisticated type of DoS attack called Distributed Denial of Service (DDoS) appeared.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijeecs.v14.i1.pp155-168">doi:10.11591/ijeecs.v14.i1.pp155-168</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/no36gtwmkvfolo3almw3jta4qy">fatcat:no36gtwmkvfolo3almw3jta4qy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201105195938/http://ijeecs.iaescore.com/index.php/IJEECS/article/download/14329/11906" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/39/23/39236e62ee224f85d51ab59621edbe0b7ff1143b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11591/ijeecs.v14.i1.pp155-168"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Protection Against Denial of Service Attacks: A Survey

G. Loukas, G. Oke
<span title="2009-08-19">2009</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bf4qaipmsrghrjyxonrsmqevie" style="color: black;">Computer journal</a> </i> &nbsp;
Denial of Service (DoS) is a prevalent threat in today's networks because DoS attacks are easy to launch, while defending a network resource against them is disproportionately difficult.  ...  These include traceback, detection, classification of incoming traffic, response in the presence of an attack, and mathematical modelling of attack and defence mechanisms.  ...  For this reason, the authors of [41] suggest using Kolmogorov complexity metrics for DoS detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxp078">doi:10.1093/comjnl/bxp078</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ohslj352kfcpfnfvki2a2wxorm">fatcat:ohslj352kfcpfnfvki2a2wxorm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171019174851/http://staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/d9/cdd91609bb48cb0a43d56c51c87e293564d747c9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxp078"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> oup.com </button> </a>

Genetically induced communication network fault tolerance

Stephen F. Bush
<span title="">2003</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/y3fh56bfunh5fgneywwba6d4ke" style="color: black;">Complexity</a> </i> &nbsp;
Rapid generation of network service code occurs via a genetic programming paradigm.  ...  The transfer and execution of code in support of the evolution of network protocols and services would not be possible without the active network environment.  ...  Previous work has demonstrated the use of Kolmogorov Complexity for Distributed Denial of Service (DDoS) attack detection [24] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/cplx.20002">doi:10.1002/cplx.20002</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zpu3co4m7fbabkbynslieglf2i">fatcat:zpu3co4m7fbabkbynslieglf2i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808213610/http://dynamics.org/Altenberg/UH_ICS/EC_REFS/GP_REFS/APPLICATIONS/GE-SFI-AdaptiveSecurity.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cf/af/cfaf187f6ea318b4aa078d8f7f802e1be8378d44.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/cplx.20002"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> wiley.com </button> </a>

Security threat probability computation using Markov Chain and Common Vulnerability Scoring System

Ngoc T. Le, Doan B. Hoang
<span title="">2018</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uwt2ryajazcizivoiyoy5dxh5m" style="color: black;">2018 28th International Telecommunication Networks and Applications Conference (ITNAC)</a> </i> &nbsp;
The paper gives an application on cloud systems to demonstrate the use of the proposed approach.  ...  This paper proposes a novel approach to compute the probability distribution of cloud security threats based on Markov chain and Common Vulnerability Scoring System (CVSS).  ...  attacks. • Denial of Service (DOS).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/atnac.2018.8615386">doi:10.1109/atnac.2018.8615386</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/itnac/LeH18.html">dblp:conf/itnac/LeH18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4ddu4cyvbngw7hmna64cdlg2ve">fatcat:4ddu4cyvbngw7hmna64cdlg2ve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210427221216/https://opus.lib.uts.edu.au/bitstream/10453/128859/4/Ngoc-PID5616945.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/33/253345830ba3c2073c5415aca27eaeb40a4ebfc0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/atnac.2018.8615386"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches

Sanjay Goel, Stephen F. Bush
<span title="">2003</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/y3fh56bfunh5fgneywwba6d4ke" style="color: black;">Complexity</a> </i> &nbsp;
This paper presents results in two mutually complementary areas: distributed immunological information assurance and a new signature matching technique based upon Kolmogorov Complexity.  ...  Three separate schemes for detecting pathogens are examined, namely, Contiguous string matching, Hamming Distance, and Kolmogorov Complexity.  ...  ACKNOWLEDGEMENTS The authors would like to thank Professor Jagdish Gangolly (Department of Accounting & Law, University at Albany, SUNY) for his helpful comments and review of the manuscript.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/cplx.20004">doi:10.1002/cplx.20004</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/64yn4ez6hfeqtfjy2h3rwul3zm">fatcat:64yn4ez6hfeqtfjy2h3rwul3zm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20050516165831/http://www.crd.ge.com:80/~bushsf/pdfpapers/ImmunoComplexity.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/62/2d/622d7a25479322daf556e8a7acb77ab889b17ed8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/cplx.20004"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> wiley.com </button> </a>

A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network

G. Oke, G. Loukas
<span title="2007-09-26">2007</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/bf4qaipmsrghrjyxonrsmqevie" style="color: black;">Computer journal</a> </i> &nbsp;
Gulay and Loukas, George (2007) A denial of service detector based on maximum likelihood detection and the random neural network.  ...  Abstract In spite of extensive research in defence against Denial of Service (DoS), such attacks remain a predominant threat in today's networks.  ...  Based on the observation that highly correlated packets are used in Dos attacks, while legitimate traffic is in some sense random, in [9] Kolmogorov complexity metrics, a measure of correlation in the  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxm066">doi:10.1093/comjnl/bxm066</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qkoauixsgvdzbkrmmzezybu5wq">fatcat:qkoauixsgvdzbkrmmzezybu5wq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170921215320/http://gala.gre.ac.uk/15020/1/15020_Loukas_A%20denial%20of%20service%20detector%20%28AAM%29%202007.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/85/fb/85fb2f4661cf0c4e331bdcc6aa0efe2ec3984986.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/comjnl/bxm066"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> oup.com </button> </a>

PPF Model with CTNT to Defend Web Server from DDoS Attack [chapter]

Jungtaek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We present a probabilistic packet filtering (PPF) model to defend the Web server against Distributed Denial-of-Service (DDoS) attacks.  ...  If the CTNT mechanism detects DDoS attacks, the proposed model probabilistically filters the packets related to these. The simulation results demonstrate it is useful to early detect DDoS attacks.  ...  However, those kinds of environments are very vulnerable to Distributed Denial-of-Service (DDoS) attacks [1] , [2] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11596042_101">doi:10.1007/11596042_101</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b522edbsinevhge52dl5yffbhi">fatcat:b522edbsinevhge52dl5yffbhi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190504220331/https://link.springer.com/content/pdf/10.1007%2F11596042_101.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/27/5c/275c8c6121bf039e9487032bd1e38cd52664f85a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11596042_101"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers

Jaydip Sen
<span title="2011-03-16">2011</span> <i title="Academy and Industry Research Collaboration Center (AIRCC)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/j62rfr7b3rdbdoatlol5nazobq" style="color: black;">International journal of network security and its applications</a> </i> &nbsp;
Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time.  ...  attackers from depleting the resources of the network and denying services to legitimate users.  ...  Figure 1 illustrates another type of bandwidth attack called a distributed reflector denial of service (DRDoS) attack, which aims to obscure the sources of attack traffic by using third parties (routers  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5121/ijnsa.2011.3213">doi:10.5121/ijnsa.2011.3213</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mriqkgjegjhq5nxf2ctdnvyqky">fatcat:mriqkgjegjhq5nxf2ctdnvyqky</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160805231239/http://airccse.org:80/journal/nsa/0311nsa13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/ea/61eadab4df582dade9918e2d56a1827a8c41d79f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5121/ijnsa.2011.3213"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 194 results