A Blockchain Based Link-Flooding Attack Detection Scheme

Author(s):  
Wanqin Cao ◽  
Yunhui Huang ◽  
Dezheng Li ◽  
Feng Yang ◽  
Xiaofeng Jiang ◽  
...  
2012 ◽  
Vol 35 (11) ◽  
pp. 1380-1391 ◽  
Author(s):  
Hamza Rahmani ◽  
Nabil Sahli ◽  
Farouk Kamoun

2019 ◽  
Vol 8 (7) ◽  
pp. 251-256
Author(s):  
Hiromu Asahina ◽  
Kei Sakuma ◽  
Shuichiro Haruta ◽  
Hiroya Kato ◽  
Iwao Sasase

Author(s):  
Shanshan Yu ◽  
Jicheng Zhang ◽  
Ju Liu ◽  
Xiaoqing Zhang ◽  
Yafeng Li ◽  
...  

AbstractIn order to solve the problem of distributed denial of service (DDoS) attack detection in software-defined network, we proposed a cooperative DDoS attack detection scheme based on entropy and ensemble learning. This method sets up a coarse-grained preliminary detection module based on entropy in the edge switch to monitor the network status in real time and report to the controller if any abnormality is found. Simultaneously, a fine-grained precise attack detection module is designed in the controller, and a ensemble learning-based algorithm is utilized to further identify abnormal traffic accurately. In this framework, the idle computing capability of edge switches is fully utilized with the design idea of edge computing to offload part of the detection task from the control plane to the data plane innovatively. Simulation results of two common DDoS attack methods, ICMP and SYN, show that the system can effectively detect DDoS attacks and greatly reduce the southbound communication overhead and the burden of the controller as well as the detection delay of the attacks.


2009 ◽  
Vol 16C (1) ◽  
pp. 13-20 ◽  
Author(s):  
Jun-Sang Park ◽  
Sung-Yun Kim ◽  
Dai-Hee Park ◽  
Mi-Jung Choi ◽  
Myung-Sup Kim

2013 ◽  
Vol 380-384 ◽  
pp. 2673-2676
Author(s):  
Ze Yu Xiong

DDoS attacks have relatively low proportion of normal flow in the boundary network at the attack traffic,In this paper,we establish DDoS attack detection method based on defense stage and defensive position, and design and implement collaborative detection of DDoS attacks. Simulation results show that our approach has good timeliness, accuracy and scalability than the single-point detection and route-based distributed detection scheme.


Sign in / Sign up

Export Citation Format

Share Document