Application of entropy formulas in detection of denial‐of‐service attacks

[1]  Sunny Behal,et al.  Detection of DDoS attacks and flash events using novel information theory metrics , 2017, Comput. Networks.

[2]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[3]  Didier Sornette,et al.  Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics , 2009, PAM.

[4]  Jie Zhang,et al.  An advanced entropy-based DDOS detection scheme , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).

[5]  Miroslav Popovic,et al.  Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks , 2015, Secur. Commun. Networks.

[6]  M. Masi A step beyond Tsallis and Rényi entropies , 2005, cond-mat/0505107.

[7]  Jugal K. Kalita,et al.  An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection , 2015, Pattern Recognit. Lett..

[8]  Steve Uhlig,et al.  Providing public intradomain traffic matrices to the research community , 2006, CCRV.

[9]  Chao Wang,et al.  DDoS Attack Detection Using Flow Entropy and Clustering Technique , 2015, 2015 11th International Conference on Computational Intelligence and Security (CIS).

[10]  C. Tsallis Possible generalization of Boltzmann-Gibbs statistics , 1988 .

[11]  Anja Feldmann,et al.  Dynamics of IP traffic: a study of the role of variability and the impact of control , 1999, SIGCOMM '99.

[12]  Min Sik Kim,et al.  Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition , 2010, 2010 IEEE International Conference on Communications.

[13]  J. A. Tenreiro Machado,et al.  Entropy Analysis of Integer and Fractional Dynamical Systems , 2010 .

[14]  Miroslav Popovic,et al.  The value of flow size distribution in entropy-based detection of DoS attacks , 2016, Secur. Commun. Networks.

[15]  Antonio Pescapè,et al.  A cascade architecture for DoS attacks detection based on the wavelet transform , 2009, J. Comput. Secur..

[16]  David B. Shmoys,et al.  A Best Possible Heuristic for the k-Center Problem , 1985, Math. Oper. Res..

[17]  José M. Fernandez,et al.  A comprehensive study of queue management as a DoS counter-measure , 2013, International Journal of Information Security.

[18]  Mark Crovella,et al.  Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.

[19]  Vasilios A. Siris,et al.  Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, GLOBECOM.

[20]  Vyas Sekar,et al.  An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.

[21]  Artur Ziviani,et al.  Network anomaly detection using nonextensive entropy , 2007, IEEE Communications Letters.

[22]  M. Ubriaco,et al.  Entropies based on fractional calculus , 2009, 0902.2726.

[23]  Donald F. Towsley,et al.  Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.

[24]  Marcin Szpyrka,et al.  An Entropy-Based Network Anomaly Detection Method , 2015, Entropy.

[25]  Miroslav Popovic,et al.  Use of Tsallis entropy in detection of SYN flood DoS attacks , 2015, Secur. Commun. Networks.

[26]  Wesley M. Eddy,et al.  TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.