Application of entropy formulas in detection of denial‐of‐service attacks
暂无分享,去创建一个
[1] Sunny Behal,et al. Detection of DDoS attacks and flash events using novel information theory metrics , 2017, Comput. Networks.
[2] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[3] Didier Sornette,et al. Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics , 2009, PAM.
[4] Jie Zhang,et al. An advanced entropy-based DDOS detection scheme , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).
[5] Miroslav Popovic,et al. Evaluation of entropy-based detection of outbound denial-of-service attacks in edge networks , 2015, Secur. Commun. Networks.
[6] M. Masi. A step beyond Tsallis and Rényi entropies , 2005, cond-mat/0505107.
[7] Jugal K. Kalita,et al. An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection , 2015, Pattern Recognit. Lett..
[8] Steve Uhlig,et al. Providing public intradomain traffic matrices to the research community , 2006, CCRV.
[9] Chao Wang,et al. DDoS Attack Detection Using Flow Entropy and Clustering Technique , 2015, 2015 11th International Conference on Computational Intelligence and Security (CIS).
[10] C. Tsallis. Possible generalization of Boltzmann-Gibbs statistics , 1988 .
[11] Anja Feldmann,et al. Dynamics of IP traffic: a study of the role of variability and the impact of control , 1999, SIGCOMM '99.
[12] Min Sik Kim,et al. Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition , 2010, 2010 IEEE International Conference on Communications.
[13] J. A. Tenreiro Machado,et al. Entropy Analysis of Integer and Fractional Dynamical Systems , 2010 .
[14] Miroslav Popovic,et al. The value of flow size distribution in entropy-based detection of DoS attacks , 2016, Secur. Commun. Networks.
[15] Antonio Pescapè,et al. A cascade architecture for DoS attacks detection based on the wavelet transform , 2009, J. Comput. Secur..
[16] David B. Shmoys,et al. A Best Possible Heuristic for the k-Center Problem , 1985, Math. Oper. Res..
[17] José M. Fernandez,et al. A comprehensive study of queue management as a DoS counter-measure , 2013, International Journal of Information Security.
[18] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[19] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, GLOBECOM.
[20] Vyas Sekar,et al. An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.
[21] Artur Ziviani,et al. Network anomaly detection using nonextensive entropy , 2007, IEEE Communications Letters.
[22] M. Ubriaco,et al. Entropies based on fractional calculus , 2009, 0902.2726.
[23] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[24] Marcin Szpyrka,et al. An Entropy-Based Network Anomaly Detection Method , 2015, Entropy.
[25] Miroslav Popovic,et al. Use of Tsallis entropy in detection of SYN flood DoS attacks , 2015, Secur. Commun. Networks.
[26] Wesley M. Eddy,et al. TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.