DoS Attack Detection using Source IP address entropy and Average packet arrival time interval

Author(s):  
Keiichirou Kurihara ◽  
Kazuki Katagishi
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Wenliang Xu ◽  
Futai Zou

Tor is an anonymous communication network used to hide the identities of both parties in communication. Apart from those who want to browse the web anonymously using Tor for a benign purpose, criminals can use Tor for criminal activities. It is recognized that Tor is easily intercepted by the censorship mechanism, so it uses a series of obfuscation mechanisms to avoid censorship, such as Meek, Format-Transforming Encryption (FTE), and Obfs4. In order to detect Tor traffic, we collect three kinds of obfuscated Tor traffic and then use a sliding window to extract 12 features from the stream according to the five-tuple, including the packet length, packet arrival time interval, and the proportion of the number of bytes sent and received. And finally, we use XGBoost, Random Forest, and other machine learning algorithms to identify obfuscated Tor traffic and its types. Our work provides a feasible method for countering obfuscated Tor network, which can identify the three kinds of obfuscated Tor traffic and achieve about 99% precision rate and recall rate.


2020 ◽  
Vol 1 (1) ◽  
pp. 1-17
Author(s):  
Kyosuke Futami ◽  
Tsutomu Terada ◽  
Masahiko Tsukamoto

Although it is socially and ethically important not to be late for a specified arrival time, late arrivals sometimes happen to people using public transportation. Although many methods aim to smooth a user's movement by providing useful information, there are few approaches to prevent late arrivals due to psychological factors. In this research, to make a user's arrival time earlier and thus prevent late arrival, we propose a method that manipulates time allowance by presenting information based on a psychological and cognitive tendency. We apply this method to a vehicle timetable system for the purpose of preventing public transit users from arriving after a target vehicle's departure time. Our proposed timetable system manipulates the time intervals between a user's target vehicle and other vehicles by introducing fictional elements such as hidden vehicles and inserted fictional vehicles. This method uses the relationship between the time allowance and the departure time interval, and it can make a user desire and accept arriving at a station earlier. We implemented a prototype system and conducted four experiments. The evaluation results confirmed that our proposed method is effective for changing a user's time allowance and actual arrival time.


2012 ◽  
Vol 32 (4) ◽  
pp. 0403001 ◽  
Author(s):  
刘立生 Liu Lisheng ◽  
张合勇 Zhang Heyong ◽  
赵帅 Zhao Shuai ◽  
郭劲 Guo Jin

Sign in / Sign up

Export Citation Format

Share Document