Abstract | ||
---|---|---|
Distributed denial‐of‐service attack is a serious concern in this era of voluminous
Internet world. The challenge is to find difference between distributed denial‐of‐service
attack traffic of all types and legitimate traffic at the earliest, as we can see
high‐rate attack traffic and low rate attack traffic resembles with bursty legitimate
traffic and normal legitimate traffic, respectively. Self‐similarity exists in ethernet
traffic. Using Hurst parameter, we have differentiated legitimacy of any traffic irrespective
of network traffic protocol. We have validated our method using both benchmark and
real‐life datasets, and the results are highly satisfactory. Copyright © 2016 John
Wiley & Sons, Ltd.
|
Year | DOI | Venue |
---|---|---|
2016 | 10.1002/sec.1639 | Security and Communication Networks |
Keywords | Field | DocType |
self‐similarity,Hurst parameter,DDoS attack | Denial-of-service attack,Computer security,Computer science,Hurst exponent,Computer network,Ethernet,Self-similarity,The Internet | Journal |
Volume | Issue | ISSN |
9 | 17 | 1939-0122 |
Citations | PageRank | References |
2 | 0.40 | 11 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Rup Kumar Deka | 1 | 4 | 1.48 |
Dhruba K. Bhattacharyya | 2 | 226 | 27.72 |