[go: up one dir, main page]

Choi et al., 2020 - Google Patents

A lightweight detection using Bloom filter against flooding DDoS attack

Choi et al., 2020

View PDF
Document ID
11782649305644456178
Author
Choi S
An Y
Sasase I
Publication year
Publication venue
IEICE TRANSACTIONS on Information and Systems

External Links

Snippet

The flooding DDoS attack is a serious problem these days. In order to detect the flooding DDoS attack, the survival approaches and the mitigation approaches have been investigated. Since the survival approach occurs the burden on the victims, the mitigation …
Continue reading at www.jstage.jst.go.jp (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
He et al. Machine learning based DDoS attack detection from source side in cloud
Zarras et al. Automated generation of models for fast and precise detection of HTTP-based malware
Saravanan et al. A new framework to alleviate DDoS vulnerabilities in cloud computing.
Bhatt et al. HADS: Hybrid anomaly detection system for IoT environments
Agrawal et al. A lightweight approach to detect the low/high rate IP spoofed cloud DDoS attacks
Le et al. Unsupervised monitoring of network and service behaviour using self organizing maps
Prajapati et al. A review on recent intrusion detection systems and intrusion prevention systems in IoT
Vattikuti et al. DDoS attack detection and mitigation using anomaly detection and machine learning models
Choi et al. A lightweight detection using Bloom filter against flooding DDoS attack
Golchin et al. Sscl-ids: Enhancing generalization of intrusion detection with self-supervised contrastive learning
Preetha et al. Autonomous Agent for DDoS Attack Detection and Defense in an Experimental Testbed.
Gehri et al. Towards generalizing machine learning models to detect command and control attack traffic
Anand et al. Performance analysis of ACO-based IP Traceback
Subbulakshmi A learning-based hybrid framework for detection and defence of DDoS attacks
Khosroshahi et al. Detection of sources being used in ddos attacks
Patil et al. Feature reduction in flow based intrusion detection system
Kiruthika et al. Enhancement of detection mechanisms for HTTP based DoS/DDoS attacks
Althobiti et al. Machine learning approach to secure software defined network: Machine learning and artificial intelligence
Ichino et al. Evaluating header information features for malware infection detection
Drinić et al. Survey on Low-Rate DDoS Attacks, Detection and Defense
Glăvan et al. DDoS Detection and Prevention Based on Artificial Intelligence Techniques.
Selvaraj et al. An effective ODAIDS-HPs approach for preventing, detecting and responding to DDoS attacks
MR An Empirical Assessment of Botnets and Detection Methods.
Vadlamani A survey on detection and defense of application layer DDoS attacks
Fufan et al. SYN Flood Attack Detection and Prevention Technique (SFaDMT) in Distributed Environment