A survey of distance and similarity measures used within network intrusion anomaly detection

DJ Weller-Fahy, BJ Borghetti… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Anomaly detection (AD) use within the network intrusion detection field of research, or
network intrusion AD (NIAD), is dependent on the proper use of similarity and distance …

Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions

A Bhardwaj, V Mangat, R Vig, S Halder… - Computer Science Review, 2021 - Elsevier
Cloud computing model provides on demand, elastic and fully managed computer system
resources and services to organizations. However, attacks on cloud components can cause …

Analyzing well-known countermeasures against distributed denial of service attacks

H Beitollahi, G Deconinck - Computer Communications, 2012 - Elsevier
This paper reviews and analyzes well-known countermeasures against distributed denial of
service (DDoS) attacks. This paper provides an in-depth analysis of each countermeasure …

Security challenges in cloud computing: state-of-art

K Bhushan, BB Gupta - International Journal of Big Data …, 2017 - inderscienceonline.com
Cloud computing platform provides on-demand access of services, and these services can
also be customised, which enables the customers to use these services as per their …

Filtering-based defense mechanisms against DDoS attacks: A survey

K Kalkan, G Gür, F Alagöz - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
This paper presents a comprehensive survey on filtering-based defense mechanisms
against distributed denial of service (DDoS) attacks. Several filtering techniques are …

Multifractal detrended fluctuation analysis based detection for SYN flooding attack

D Nashat, FA Hussain - Computers & Security, 2021 - Elsevier
The TCP SYN flooding (half-open connection) attack is a type of DDoS attack, which denies
the services by consuming the server resources. This attack prevents legitimate users from …

Network traffic anomalies detection using a fixing method of multifractal dimension jumps in a real-time mode

OI Sheluhin, IY Lukin - Automatic Control and Computer Sciences, 2018 - Springer
This article considers the possibility of detecting traffic anomalies on the basis of multiscale,
multifractal analysis by monitoring fractal-dimensional jumps in real time. The method is …

Anomaly detection based on LRD behavior analysis of decomposed control and data planes network traffic using SOSS and FARIMA models

B AsSadhan, K Zeb, J Al-Muhtadi, S Alshebeili - IEEE Access, 2017 - ieeexplore.ieee.org
The detection of anomalies in network traffic, such as low volume attacks and abnormalities,
has become a pressing problem in today's large volume of Internet traffic. To this end …

AI infers DoS mitigation rules

M Zadnik, E Carasec - Journal of Intelligent Information Systems, 2023 - Springer
DDoS attacks still represent a severe threat to network services. While there are more or less
workable solutions to defend against these attacks, there is a significant space for further …

Denial-of-service attack modelling and detection for HTTP/2 services

E Adi - 2017 - ro.ecu.edu.au
Businesses and society alike have been heavily dependent on Internet-based services,
albeit with experiences of constant and annoying disruptions caused by the adversary class …