透過您的圖書館登入
IP:18.222.240.21
  • 期刊

Application of Entropy in DDOS Attack Detection

摘要


In recent years, more and more common in the network to service attacks and distributed denial of service attacks, but these problems still exist in the TCP/IP network architecture to the host centric tradition. With the increasing of the DOS/DDOS attacks, the corresponding detection algorithm has become more up, DDOS attack detection algorithm based on entropy attack the detection algorithm based on hypothesis testing, the audit information offline attack detection algorithm based on the DOS/DDOS attack detection algorithm based on Entropy in the most promising and most worthy of study. The entropy is an often used to describe complex physical objects is a means by which the calculated entropy is compared to determine whether or not it conforms to the distribution. In the field of computer network, it is usually used to judge the stability of the network or to detect whether it is under malicious attack or because of the sudden increase of legal data. This thesis through reading many DDOS attack detection algorithm based on entropy of related literature, the DDOS attack detection algorithm on the system structure of the network cable under the summary, found that the current methods are based on DDOS attack detection algorithm of traditional entropy, the optimization of DDOS, making the final attack detection a shorter time, higher detection accuracy.

參考文獻


S, Yu. Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks[J]. IEEE, 2008, 6(8): 566-571.
F, Al-Haidari. An Entropy-based Countermeasure against Intelligent DoS Attacks Targeting Firewalls[J]. IEEE, 2009, 3(2): 41-44.
Xu Jiangping. "Application of Distributed Traffic Abnormality Detection Based on Statistical Analysis [D]." University of Electronic Science and Technology: Xu Jiangping, 2015. 1-1.
S. Kullback, “Letter to the editor: thekullback-leibler distance,” 1987.
Y, Xin. “A novel Interest Flooding Attacks Detection and Countermeasure Scheme in NDN[J].” IEEE, 2017, 04(08): 1-7.

延伸閱讀