Chaos Theory Based Detection against Network Mimicking DDoS Attacks
dc.contributor.author | Chonka, A. | |
dc.contributor.author | Singh, Jaipal | |
dc.contributor.author | Zhou, W. | |
dc.date.accessioned | 2017-01-30T10:45:21Z | |
dc.date.available | 2017-01-30T10:45:21Z | |
dc.date.created | 2010-02-21T20:02:44Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Chonka, Ashley and Singh, Jaipal and Zhou, Wanlei. 2009. Chaos Theory Based Detection against Network Mimicking DDoS Attacks. IEEE Communication Letters. 13 (9): pp. 717-719. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/5327 | |
dc.description.abstract |
DDoS attack traffic is difficult to differentiate from legitimate network traffic during transit from the attacker, or zombies, to the victim. In this paper, we use the theory of network self-similarity to differentiate DDoS flooding attack traffic from legitimate self-similar traffic in the network. We observed that DDoS traffic causes a strange attractor to develop in the pattern of network traffic. From this observation, we developed a neural network detector trained by our DDoS prediction algorithm. Our preliminary experiments and analysis indicate that our proposed chaotic model can accurately and effectively detect DDoS attack traffic. Our approach has the potential to not only detect attack traffic during transit, but to also filter it. | |
dc.publisher | IEEE Communications Society | |
dc.subject | anomaly detection | |
dc.subject | chaotic models | |
dc.subject | Distributed denial-of-service (DDoS) | |
dc.title | Chaos Theory Based Detection against Network Mimicking DDoS Attacks | |
dc.type | Journal Article | |
dcterms.source.volume | 13 | |
dcterms.source.number | 9 | |
dcterms.source.startPage | 717 | |
dcterms.source.endPage | 719 | |
dcterms.source.issn | 1089-7798 | |
dcterms.source.title | IEEE Communication Letters | |
curtin.note |
Copyright © 2009 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Digital Ecosystems and Business Intelligence Institute (DEBII) | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | The Digital Ecosystems and Business Intelligence Institute (DEBII) |