Zero-Crossing Analysis of Lévy Walks and a DDoS Dataset for Real-Time Feature Extraction: Composite and Applied Signal Analysis for Strengthening the Internet-of-Things Against DDoS Attacks
نویسندگان
چکیده
1 Zero-Crossing Analysis of Lévy Walks and a DDoS Dataset for Real-Time Feature Extraction: Composite and Applied Signal Analysis for Strengthening the Internet-of-Things Against DDoS Attacks; Jesus David Terrazas Gonzalez, Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Canada Witold Kinsner, Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Canada
منابع مشابه
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملRobust and efficient detection of DDoS attacks for large-scale internet
In recent years, distributed denial of service (DDoS) attacks have become a major security threat to Internet services. How to detect and defend against DDoS attacks is currently a hot topic in both industry and academia. In this paper, we propose a novel framework to robustly and efficiently detect DDoS attacks and identify attack packets. The key idea of our framework is to exploit spatial an...
متن کاملDDoS Attack in “Cloud of Things” Environment, Software Defined Networking (SDN) and A Research on Defense Mechanisms against DDoS using SDN
The Internet of Things presents the user with a novel means of communicating with the Web world through ubiquitous object-enabled networks. While IoT is exciting on its own, the real innovation will come from combining it with cloud computing. In the new era of Internet of Things integrated with cloud computing, Distributed Denial Service of Attacks (DDoS) is growing substantially. With the adv...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJSSCI
دوره 8 شماره
صفحات -
تاریخ انتشار 2016