A Resource Utilization Measurement Detection against DDoS Attacks

被引:0
作者
Chen, Chin-Ling [1 ]
Chen, Hsin-Chiao [2 ]
机构
[1] Natl Pingtung Univ, Dept Informat Management, Pingtung 900, Taiwan
[2] Natl Pingtung Inst Commerce, Dept Informat Management, Pingtung 900, Taiwan
来源
2016 9TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2016) | 2016年
关键词
Distributed denial of service; firewall; detection;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
We has proposed a DDoS detection combining rulebased and anomaly-based scheme, in which three types of system resource usage are examined. We first analyze the performance of the proposed system under the conditions imposed by both of the normal traffic and the TFN2K attack. Secondly, we find the minimum cost, such as the saturation time and critical point, for attack traffic to saturate the victim. Thirdly, a thorough investigation on comparison of the proposed scheme and the other well-known schemes is presented. Our analysis and experiments demonstrate that the proposed scheme along with ANOVA can work very well with suitable combination and fine tuning of threshold value.
引用
收藏
页码:1938 / 1943
页数:6
相关论文
共 31 条
[1]  
Chen C.-L., 2015, 3 INT C DIG ENT INF
[2]  
Chen Y, 2013, IEEE COMMUNICATIONS, V17
[3]  
Franois J., 2012, IEEE ACM T NETWORKIN, V20
[4]  
Gangam S., 2013, IEEE INT C COMP COMM, V32
[5]  
Jog M., 2015, INT C PERV COMP ICPC
[6]  
Khattab S., 2008, INFOCOM 2007 IEEE 27
[7]  
Khor S., 2011, ICC 2011 IEEE INT C, V34
[8]  
Kiremire A., 2014, CCNC 2014 11 IEEE CO, V11
[9]  
Kiruthika Devi B. S, 2014, 2014 INT C REC TREND
[10]   On scalable attack detection in the network [J].
Kompella, Ramana Rao ;
Singh, Sumeet ;
Varghese, George .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (01) :14-25