透過您的圖書館登入
IP:18.223.20.57
  • 期刊

An Autonomous Framework for Early Detection of Spoofed Flooding Attacks

並列摘要


One of the challenging tasks on the Internet is differentiating the attack traffic from legitimate traffic. Tackling this challenge would aid in the detection of Denial of Service/Distributed DoS (DoS/DDoS) attacks. In this paper, we propose a flow profiling scheme that adopts itself to detect these flooding attacks by monitoring the trends in the current traffic. Moreover, our scheme filters most of the traffic, which are found to be suspicious, at the source end, thus avoiding flooding at the target. The scheme distinguishes itself from other source end defenses in the manner in which it gathers and profiles the statistics. Information entropy, a measure to find correlation among traffic flows, is used. We made this attempt to infer the current state of the dynamic network. The result of correlation is then used to support the evidences which justify the necessity of filtering the packets. We use Theory of evidence to improve the decision making with regard to filtering. We implemented and tested our scheme using network traffic traces and found the results to be appreciable.

被引用紀錄


Chang, C. H. (2010). “DESIRE” effect for MR microscopy [master's thesis, National Tsing Hua University]. Airiti Library. https://doi.org/10.6843/NTHU.2010.00246
鄧楷翰(2014)。從二維人臉影像重建Q版三維公仔影像〔碩士論文,國立臺中科技大學〕。華藝線上圖書館。https://doi.org/10.6826/NUTC.2014.00130
Chen, C. H. (2015). TiNi基形狀記憶合金箔帶之性能以及R相自我調適行為之研究 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2015.00526
陳敏敏(2014)。木瓜秀粉介殼蟲於四種寄主植物上之生命表〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2014.00392
張吉甫(2002)。類神經網路在寬頻網路管理上之應用〔碩士論文,元智大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0009-0112200611354263

延伸閱讀