Filters








173 Hits in 6.1 sec

Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network [article]

B. B. Gupta, R. C. Joshi, Manoj Misra
2012 arXiv   pre-print
The results show that our proposed system gives a drastic improvement in terms of detection and false alarm rate.  ...  Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the financial support of the Ministry of Human Resource Development (MHRD), Government of India for partial work reported in the paper.  ... 
arXiv:1204.5592v1 fatcat:zqe7lkbx35hm7fyw4kyrw5auvq

Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detectionin ISP Network

B. B. Gupta, R. C. Joshi, Manoj Misra
2009 Journal of clean energy technologies  
The results show that our proposed system gives a drastic improvement in terms of detection and false alarm rate.  ...  Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the financial support of the Ministry of Human Resource Development (MHRD), Government of India for partial work reported in the paper.  ... 
doi:10.7763/ijcte.2009.v1.12 fatcat:5vd722zxc5gurm2rgsclpc7qna

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

2018 KSII Transactions on Internet and Information Systems  
The Receiver Operating Characteristic curves show that our approach performs well in both detection probability and false alarm probability compared with the entropy-based approach.  ...  In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state  ...  ROC curves for anomaly ratio 5% and 15% cases between our approach and entropy based approach In the following, ROC curves are presented in Fig. 5 , with respect to detection probability and false alarm  ... 
doi:10.3837/tiis.2018.08.022 fatcat:syqxbifhwndufnkdpeot3w7bqe

Cooperative Defence Against DDoS Attacks

Guangsen Zhang, Manish Parashar
2006 Journal of research and practice in information technology  
In the proposed approach, DDoS defence systems are deployed in the network to detect DDoS attacks independently.  ...  As DDoS streams do not have common characteristics, currently available intrusion detection systems (IDS) cannot detect them accurately.  ...  With p = 0.4 we have low false positive and low false negative packet drop rate respectively. The false positive rate is relatively higher than the false negative rate.  ... 
dblp:journals/acj/ZhangP06 fatcat:jrtlwllzzves3c2url3q2zdkri

Memcached: An Experimental Study of DDoS Attacks for the Wellbeing of IoT Applications

Nivedita Mishra, Sharnil Pandya, Chirag Patel, Nagaraj Cholli, Kirit Modi, Pooja Shah, Madhuri Chopade, Sudha Patel, Ketan Kotecha
2021 Sensors  
In the undertaken study, the solution acts as a pre-emptive measure for detecting DDoS attacks while maintaining low latency and high throughput.  ...  The proposed solution is a novel identification-pattern mechanism using a threshold scheme for detecting volume-based DDoS attacks.  ...  The presented work uses the threshold technique for DDoS attack detection and mitigation in Memcached-based DDoS attacks.  ... 
doi:10.3390/s21238071 pmid:34884075 fatcat:cirf37lkjbhxxdmn5zuhtk3laa

A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

Adrien Bonguet, Martine Bellaiche
2017 Future Internet  
In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined.  ...  Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are serious threats to the Cloud services' availability due to numerous new vulnerabilities introduced by the nature of the Cloud  ...  Experiment Efficiency Design Impact of defense system Data collection Overhead bandwith Simulation Processing time Testbed Detection attack False alarm False negative Parameters Mitigation  ... 
doi:10.3390/fi9030043 fatcat:zhhl36zts5g7rkstbitjj2kde4

DeepIDS: Deep Learning Approach for Intrusion Detection in Software Defined Networking

Tuan Anh Tang, Lotfi Mhamdi, Des McLernon, Syed Ali Raza Zaidi, Mounir Ghogho, Fadi El Moussa
2020 Electronics  
Through experiments, we confirm that the DL approach has the potential for flow-based anomaly detection in the SDN environment.  ...  In this paper, we propose a deep learning (DL) approach for a network intrusion detection system (DeepIDS) in the SDN architecture.  ...  SVM was used in [17, 18] to detect DDoS attacks in SDNs quite efficiently. One-class SVM was trained with a malicious dataset for a low false alarm rate in [19] . AlEroud et al.  ... 
doi:10.3390/electronics9091533 doaj:f9e1c3d429e54c9b85cf3eb12fe5cd03 fatcat:mbeay5gl7jb27cdst6ls7dl7hi

MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET

Mohammed Al-Mehdhara, Na Ruan, Oscar Esparza
2021 Wireless Communications and Mobile Computing  
Experimental results show that our solution can efficiently detect malicious traffic, prevent and mitigate DDoS attacks, and increase system security and recovery speed from the attacking traffic.  ...  Simulation results demonstrate the effectiveness and efficiency of the MSOM regarding detection accuracy and other studied metrics.  ...  Among these attacks, the most severe threats to the VANET environment are DDoS attacks.  ... 
doi:10.1155/2021/8891758 fatcat:nnluxo4nvbdkhpcdfas6vaqj5e

DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective

Zhaobin Li, Bin Yang, Xinyu Zhang, Chao Guo, Zhen Wang
2022 Security and Communication Networks  
This paper designs different defense methods for different DDoS attacks and constructs a multitype DDoS defense model based on a dynamic Bayesian game in the Software-Defined Space-Air-Ground Integrated  ...  Compared with the existing traditional Support Vector Machine (SVM) defense method, the performance of the proposed method is better, and it provides one of the references for DDoS defense in SD-SAGIN.  ...  Influence of Detection Rate and False Alarm Rate on Prior Belief. Detection rate P D and false alarm rate P F have important effects on belief convergence.  ... 
doi:10.1155/2022/1886516 fatcat:6ifow5rvxfa5hiniklbgtbfoq4

Offloading Real-time DDoS Attack Detection to Programmable Data Planes

Ângelo C. Lapolli, Jonatas Adilson Marques, Luciano Paschoal Gaspary
2019 IFIP/IEEE Symposium on Integrated Network Management  
In this paper, we explore P4 primitives to design a fine-grained, low-footprint, and low-latency traffic inspection mechanism for real-time DDoS attack detection.  ...  The results show that it can detect DDoS attacks entirely within the data plane with high accuracy (98.2%) and low latency (≈250 ms) while keeping device resource usage low (dozens of kilobytes in SRAM  ...  ACKNOWLEDGEMENTS This work was partially funded by the National Council for Scientific and Technological Development (CNPq -441892/2016-7), the Coordination for the Improvement of Higher Education Personnel  ... 
dblp:conf/im/LapolliMG19 fatcat:grndio4djrbofjhnvc6e7kvfbm

Autoencoder for Design of Mitigation Model for DDOS Attacks via M-DBNN

Ankit Agrawal, Rajiv Singh, Manju Khari, S. Vimal, Sangsoon Lim, Nima Jafari Navimipour
2022 Wireless Communications and Mobile Computing  
As a result, high-performance machine learning classifiers with low false-positive rates and high prediction accuracy are required for the DDoS detection system.  ...  The proposed method demonstrates great detection accuracy with a low error.  ...  Calculating and displaying the true positive ratio instead of the false-positive ratio for classification at different thresholds give the ROC curve.  ... 
doi:10.1155/2022/9855022 fatcat:hqibrpa2tjh77jt3k2jp6ovsjq

Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method

Mona Alduailij, Qazi Waqas Khan, Muhammad Tahir, Muhammad Sardaraz, Mai Alduailij, Fazila Malik
2022 Symmetry  
This article presents a method for DDoS attack detection in cloud computing. The primary objective of this article is to reduce misclassification error in DDoS detection.  ...  Detection of DDoS attacks is necessary for the availability of services for legitimate users. The topic has been studied by many researchers, with better accuracy for different datasets.  ...  According to the result, a support vector classifier with the RF hybrid model classifies traffic, with improved testing accuracy and a very low false-alarm rate. Tonkal et al.  ... 
doi:10.3390/sym14061095 fatcat:diuz7jdy3neixozwtw6q2ac7r4

Operational experiences with anomaly detection in backbone networks

Maurizio Molina, Ignasi Paredes-Oliva, Wayne Routly, Pere Barlet-Ros
2012 Computers & security  
During this process, we analyzed three different commercial tools for anomaly detection and then deployed one of them for several months in the 18 points-of-presence of GÉANT.  ...  The objective of this work is to fill this gap by reporting hands-on experience in the evaluation and deployment of an anomaly detection solution for the GÉANT backbone network.  ...  The false positive (FP) ratio for NR was the lowest one (15.98%), while SW had a similar value (20.4%). Half of the anomalies detected by PF (54.86%) were FP.  ... 
doi:10.1016/j.cose.2012.01.009 fatcat:qyz2zslmjbeb7hpqrj6q44pazu

Artificial intelligence enabled software-defined networking: a comprehensive overview

Majd Latah, Levent Toker
2019 IET Networks  
with low false alarm rates (0.55%).  ...  Van et al. [87] J48-tree Intrusion detection on OF switches An overall accuracy of 93.3% and detection rate of 91.81% with low false alarm rates 0.55%.  ... 
doi:10.1049/iet-net.2018.5082 fatcat:celiaiit7jhrfnufpoltuecf5y

A Comprehensive Study on Intrusion and Extrusion Phenomena

Md. Abdul Hamid, Marjia Akter, M. F. Mridha, Muhammad Mostafa Monowar, Madini O. Alassafi
2021 International Journal of Advanced Computer Science and Applications  
We strongly believe that this survey may help understanding intrusion and extrusion phenomena, and pave the way for a better design to protect against security threats. A.  ...  This paper presents a comprehensive survey on intrusion and extrusion phenomena and their existing detection and prevention techniques.  ...  lower false alarm rate Accuracy False 80.7% No No TABLE XI .  ... 
doi:10.14569/ijacsa.2021.0120899 fatcat:5kanmwdbhzfx7lldjmaqd3glgi
« Previous Showing results 1 — 15 out of 173 results