Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Model

被引:7
作者
Oo, Ko Ko [1 ,2 ]
Ye, Kyaw Zaw [1 ,2 ]
Tun, Hein [1 ,2 ]
Lin, Kyaw Zin [1 ,2 ]
Portnov, E. M. [1 ,2 ]
机构
[1] Minist Def, Nay Pyi Daw, Myanmar
[2] Natl Res Univ Elect Technol, Dept Informat & Comp Software Syst, Moscow, Russia
来源
GENETIC AND EVOLUTIONARY COMPUTING, VOL I | 2016年 / 387卷
关键词
Information security; Distributed denial of service attacks; Packet classification algorithm; Intrusion detection system; Intrusion prevention system; Hidden semi-markov model; DEFENSE-MECHANISMS;
D O I
10.1007/978-3-319-23204-1_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we discuss about the classification of DDOS, which are widely regarded as a major threat to the Internet. Nature of DDoS attack is difficult to defend against and will continue to be an attractive and effective form of attack. Though many solutions have been proposed, the problem has not been solved yet. The defense approaches can be classified as protection, detection and prevention. Therefore, for information security, it is needed to create own DDoS defense system to solve the DDoS attack problems. The aim of the research work is to protect Distributed Denial of Service attacks.
引用
收藏
页码:125 / 135
页数:11
相关论文
共 10 条
  • [1] Babu G.P., ANOMALY DETECTION US
  • [2] Bacher P., 2005, TECH REP
  • [3] DDoS attacks and defense mechanisms: classification and state-of-the-art
    Douligeris, C
    Mitrokotsa, A
    [J]. COMPUTER NETWORKS, 2004, 44 (05) : 643 - 666
  • [4] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [5] Sequence-order-independent network profiling for detecting application layer DDoS attacks
    Lee, Sangjae
    Kim, Gisung
    Kim, Sehun
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [6] Survey of network-based defense mechanisms countering the DoS and DDoS problems
    Peng, Tao
    Leckie, Christopher
    Ramamohanarao, Kotagiri
    [J]. ACM COMPUTING SURVEYS, 2007, 39 (01)
  • [7] Radware Ltd, 2013, DDOS SURV HDB
  • [8] A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors
    Xie, Yi
    Yu, Shun-Zheng
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (01) : 54 - 65
  • [9] YI X, 2006, P 10 INT C COMP SUPP, V2, P811
  • [10] Yu S., IEEE T PARALLEL DIST, V22, P412