Choi et al., 2020 - Google Patents
A lightweight detection using Bloom filter against flooding DDoS attackChoi et al., 2020
View PDF- Document ID
- 11782649305644456178
- Author
- Choi S
- An Y
- Sasase I
- Publication year
- Publication venue
- IEICE TRANSACTIONS on Information and Systems
External Links
Snippet
The flooding DDoS attack is a serious problem these days. In order to detect the flooding DDoS attack, the survival approaches and the mitigation approaches have been investigated. Since the survival approach occurs the burden on the victims, the mitigation …
- 238000001514 detection method 0 title abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
He et al. | Machine learning based DDoS attack detection from source side in cloud | |
Zarras et al. | Automated generation of models for fast and precise detection of HTTP-based malware | |
Saravanan et al. | A new framework to alleviate DDoS vulnerabilities in cloud computing. | |
Bhatt et al. | HADS: Hybrid anomaly detection system for IoT environments | |
Agrawal et al. | A lightweight approach to detect the low/high rate IP spoofed cloud DDoS attacks | |
Le et al. | Unsupervised monitoring of network and service behaviour using self organizing maps | |
Prajapati et al. | A review on recent intrusion detection systems and intrusion prevention systems in IoT | |
Vattikuti et al. | DDoS attack detection and mitigation using anomaly detection and machine learning models | |
Choi et al. | A lightweight detection using Bloom filter against flooding DDoS attack | |
Golchin et al. | Sscl-ids: Enhancing generalization of intrusion detection with self-supervised contrastive learning | |
Preetha et al. | Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed. | |
Gehri et al. | Towards generalizing machine learning models to detect command and control attack traffic | |
Anand et al. | Performance analysis of ACO-based IP Traceback | |
Subbulakshmi | A learning-based hybrid framework for detection and defence of DDoS attacks | |
Khosroshahi et al. | Detection of sources being used in ddos attacks | |
Patil et al. | Feature reduction in flow based intrusion detection system | |
Kiruthika et al. | Enhancement of detection mechanisms for HTTP based DoS/DDoS attacks | |
Althobiti et al. | Machine learning approach to secure software defined network: Machine learning and artificial intelligence | |
Ichino et al. | Evaluating header information features for malware infection detection | |
Drinić et al. | Survey on Low-Rate DDoS Attacks, Detection and Defense | |
Glăvan et al. | DDoS Detection and Prevention Based on Artificial Intelligence Techniques. | |
Selvaraj et al. | An effective ODAIDS-HPs approach for preventing, detecting and responding to DDoS attacks | |
MR | An Empirical Assessment of Botnets and Detection Methods. | |
Vadlamani | A survey on detection and defense of application layer DDoS attacks | |
Fufan et al. | SYN Flood Attack Detection and Prevention Technique (SFaDMT) in Distributed Environment |