One-Parameter Statistical Methods to Recognize DDoS Attacks

نویسندگان

چکیده

Within our academic high-speed network infrastructure which is used for connecting all universities and high schools in country to the Internet, there are thousands of cybersecurity attacks occurring every day. That why, within SANET II project, an effort has been made create a self-learning system without teacher, would be able quickly adapt arbitrary traffic recognize DDoS on time, even networks, with potential simple implementation into hardware probe. In article, we deal Hurst autoregression coefficients coefficient variation. We test simulated data real records attacks. For early machine recognition attack, propose so-called predicting σ-tunnel. The obtained results can lead investigation other prediction methods that improve attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ConnectionScore: a statistical technique to resist application-layer DDoS attacks

In an application-layer distributed denial of service (DDoS) attack, zombie machines send a large number of legitimate requests to the victim server. Since these requests have legitimate formats and are sent through normal TCP connections, intrusion detection systems (IDS) cannot detect them. In these attacks, an adversary does not saturate the bandwidth of the victim server through inbound tra...

متن کامل

Collaborative Defense Mechanism Using Statistical Detection Method against DDoS Attacks

Distributed Denial-of-Service attack (DDoS) is one of the most outstanding menaces on the Internet. A DDoS attack generally attempts to overwhelm the victim in order to deny their services to legitimate users. A number of approaches have been proposed for defending against DDoS attacks accurately in real time. However, existing schemes have limits in terms of detection accuracy and delay if the...

متن کامل

Throttling DDoS Attacks

Distributed Denial of Service poses a significant threat to the Internet today. In these attacks, an attacker runs a malicious process in compromised systems under his control and generates enormous number of requests, which in turn can easily exhaust the computing resources of a victim web server within a short period of time. Many mechanisms have been proposed till date to combat this attack....

متن کامل

Linking Amplification DDoS Attacks to Booter Services

We present techniques for attributing amplification DDoS attacks to the booter services that launched the attack. Our k-Nearest Neighbor (k -NN) classification algorithm is based on features that are characteristic for a DDoS service, such as the set of reflectors used by that service. This allows us to attribute DDoS attacks based on observations from honeypot amplifiers, augmented with traini...

متن کامل

surviving DDoS attacks

ka n d u l a @ M IT. E D U C O N S I D E R T H E F O L L O W I N G S C E N A R I O : Alyssa Hacker subverts tens of thousands of machines by using a worm and then uses these zombies to mount a distributed denial of service attack on a Web server. Alyssa’s zombies do not launch a SYN flood or issue dummy packets that will only congest the Web server’s access link. Instead, the zombies fetch file...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2022

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym14112388