An enhanced entropy approach to detect and prevent DDoS in cloud environment

N Jeyanthi, NCSN Iyengar, PCM Kumar… - International …, 2013 - search.proquest.com
Abstract Distributed Denial of Service (DDoS) attack launched in Cloud computing
environment resulted in loss of sensitive information, Data corruption and even rarely lead to …

Network backbone anomaly detection using double random forests based on non-extensive entropy feature extraction

M Yin, D Yao, J Luo, X Liu, J Ma - 2013 Ninth International …, 2013 - ieeexplore.ieee.org
This paper proposed an anomaly detection method that can be used in high speed network
backbone. To adapt for the need of online cost-sensitive data processing, some of the …

A lightweight countermeasure to cope with flooding attacks against session initiation protocol

I Hussain, S Djahel, D Geneiatakis… - 6th Joint IFIP …, 2013 - ieeexplore.ieee.org
Session Initiation Protocol (SIP) is a widely used protocol for voice and video communication
in Internet architecture. Due to its open nature and the lack of robust security mechanisms …

基于改进非广延熵特征提取的双随机森林实时入侵检测方法

姚东, 罗军勇, 陈武平, 尹美娟 - 计算机科学, 2013 - cqvip.com
在网络骨干链路的高速, 大数据量环境下, 相对于正常数据, 攻击及异常数据相对较少,
进行实时入侵检测难度大. 针对此问题, 提出了一种基于改进非广延熵特征提取和双随机森林的 …

A restrictive model (RM) for detection and prevention of INVITE flooding attack

MA Raza, M Raza - 2013 3rd IEEE International Conference …, 2013 - ieeexplore.ieee.org
The denial of service (DOS) attack is a known problem in computer networks. This paper
reviews DOS attack at the Application layer using session initiation protocol (SIP). Most of …

[PDF][PDF] Real time detection and response of distributed denial of service attacks for web services

S Shiaeles - 2013 - infosec.aueb.gr
First of all, I owe a special debt of gratitude to Professor Basilis Papadopoulos for entrusting
me the method he developed on fuzzy estimator. Following this method and under his …