Denial-of-Service Attack-Detection Techniques
IEEE Internet Computing
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Early DoS Attack Detection using Smoothened Time-Series andWavelet Analysis
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
IEEE Communications Letters
Mathematical model for low-rate DoS attacks against application servers
IEEE Transactions on Information Forensics and Security
RRED: robust RED algorithm to counter low-rate denial-of-service attacks
IEEE Communications Letters
Application of Chaos in Weak Signal Detection
ICMTMA '11 Proceedings of the 2011 Third International Conference on Measuring Technology and Mechatronics Automation - Volume 01
The Research of Weak Fault Signal Detection Based on the Duffing Oscillator Coupled Synchronization
IWCFTA '11 Proceedings of the 2011 Fourth International Workshop on Chaos-Fractals Theories and Applications
Packet-Hiding Methods for Preventing Selective Jamming Attacks
IEEE Transactions on Dependable and Secure Computing
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
A low-rate denial of service (LDoS) attack behaves as a small signal in periodic pulses with low average rate, which hides in normal TCP traffic stealthily. LDoS attacks reduce link throughput and degrade QoS of a target. An approach of detecting LDoS attacks is proposed based on Duffing oscillator in chaos systems. The approach detects LDoS attacks by adopting the technology of digital signal processing (DSP), which takes an LDoS attack as a small signal and normal TCP traffic as background noise. Duffing oscillator is used to detect LDoS attacks in normal TCP traffic. Simulations show that the LDoS attacks can be detected through diagram of the chaotic state, and the period and pulse width of LDoS attacks can be estimated.