N. Jeyanthi, J. Vinithra, S. Sneha, R. Thandeeswaran, N. Iyengar
{"title":"一种检测DDoS攻击的递归量化分析方法","authors":"N. Jeyanthi, J. Vinithra, S. Sneha, R. Thandeeswaran, N. Iyengar","doi":"10.1109/CICN.2011.12","DOIUrl":null,"url":null,"abstract":"Distributed Denial of Service (DDoS) is a type of attack in the application layer initiated from the various hosts to a single web server. The aim of this attack is to consume all the resources of the targeted system by exploiting the vulnerability. We proposed a mathematical model called Recurrence Quantification Analysis (RQA) for detecting the DDoS attacks by computing entropy and determinism of selected packet attributes. To detect the anomalies and check the performance we considered the live traffic traces from the network and various RQA parameters like entropy, laminarity and determinism were used to determine the uncertainty or randomness in the dataset.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"A Recurrence Quantification Analytical Approach to Detect DDoS Attacks\",\"authors\":\"N. Jeyanthi, J. Vinithra, S. Sneha, R. Thandeeswaran, N. Iyengar\",\"doi\":\"10.1109/CICN.2011.12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Distributed Denial of Service (DDoS) is a type of attack in the application layer initiated from the various hosts to a single web server. The aim of this attack is to consume all the resources of the targeted system by exploiting the vulnerability. We proposed a mathematical model called Recurrence Quantification Analysis (RQA) for detecting the DDoS attacks by computing entropy and determinism of selected packet attributes. To detect the anomalies and check the performance we considered the live traffic traces from the network and various RQA parameters like entropy, laminarity and determinism were used to determine the uncertainty or randomness in the dataset.\",\"PeriodicalId\":292190,\"journal\":{\"name\":\"2011 International Conference on Computational Intelligence and Communication Networks\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Computational Intelligence and Communication Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICN.2011.12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2011.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
摘要
分布式拒绝服务(Distributed Denial of Service, DDoS)是一种针对应用层的攻击,由多个主机向单个web服务器发起。这种攻击的目的是利用漏洞消耗目标系统的所有资源。我们提出了一种递归量化分析(RQA)数学模型,通过计算熵和所选包属性的确定性来检测DDoS攻击。为了检测异常并检查性能,我们考虑了来自网络的实时流量轨迹和各种RQA参数,如熵,层流和确定性,用于确定数据集中的不确定性或随机性。
A Recurrence Quantification Analytical Approach to Detect DDoS Attacks
Distributed Denial of Service (DDoS) is a type of attack in the application layer initiated from the various hosts to a single web server. The aim of this attack is to consume all the resources of the targeted system by exploiting the vulnerability. We proposed a mathematical model called Recurrence Quantification Analysis (RQA) for detecting the DDoS attacks by computing entropy and determinism of selected packet attributes. To detect the anomalies and check the performance we considered the live traffic traces from the network and various RQA parameters like entropy, laminarity and determinism were used to determine the uncertainty or randomness in the dataset.