Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

TÜBİTAK

2018

DDoS attacks

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Generalized Detection System To Detect Distributed Denial Of Service Attacks And Flash Events For Information Theory Metrics, Sunny Behal, Krishan Kumar, Monika Sachdeva Jan 2018

A Generalized Detection System To Detect Distributed Denial Of Service Attacks And Flash Events For Information Theory Metrics, Sunny Behal, Krishan Kumar, Monika Sachdeva

Turkish Journal of Electrical Engineering and Computer Sciences

Distributed denial of service (DDoS) attacks pose a severe threat to extensively used web-based services and applications. Many detection approaches have been proposed in the literature, but ensuring the security and availability of data, resources, and services to end users remains an ongoing research challenge. Nowadays, the traffic volume of legitimate users has also increased manifold. A flash event (FE) is a high-rate legitimate traffic situation wherein millions of legitimate users start accessing a particular network resource, such as a web server, simultaneously. The detection of DDoS attacks becomes more challenging when DDoS attacks are launched during behaviorally similar FEs. …


Threshold-Based Distributed Ddos Attack Detection In Isp Networks, Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan Jan 2018

Threshold-Based Distributed Ddos Attack Detection In Isp Networks, Karanbir Singh, Kanwalvir Singh Dhindsa, Bharat Bhushan

Turkish Journal of Electrical Engineering and Computer Sciences

The purpose of this paper is to propose a more efficient and accurate distributed denial of service (DDoS) attack detection mechanism that detects DDoS attacks by monitoring the incoming traffic on the edge routers of ISP networks. It can be implemented as a module or agent function on the machine that is responsible for processing router traffic. The detection algorithm works by monitoring the traffic passing through the edge routers and identifying the occurrence of DDoS attacks or flash events. The algorithm calculates different values like the normalized router entropy, packet rate, and entropy rate and compares them against the …