Publication:
Entity entity -based parameterization for distinguishing distributed denial of service from flash events

dc.citedby1
dc.contributor.authorMohamed M.A.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorAbidin A.F.en_US
dc.contributor.authorDin M.M.en_US
dc.contributor.authorNik W.N.S.W.en_US
dc.contributor.authorMamat A.R.en_US
dc.contributor.authorid57194596063en_US
dc.contributor.authorid36682671900en_US
dc.contributor.authorid35087974100en_US
dc.contributor.authorid55348871200en_US
dc.contributor.authorid56521597200en_US
dc.contributor.authorid57220345355en_US
dc.date.accessioned2023-05-29T06:57:00Z
dc.date.available2023-05-29T06:57:00Z
dc.date.issued2018
dc.description.abstractIn a perfect condition, there are only normal network traffic and sometimes flash event traffics due to some eyecatching or heartbreaking events. Nevertheless, both events carry legitimate requests and contents to the server. Flash event traffic can be massive and damaging to the availability of the server. However, it can easily be remedied by hardware solutions such as adding extra processing power and memory devices and software solution such as load balancing. In contrast, a collection of illegal traffic requests produced during distributed denial of service (DDoS) attack tries to cause damage to the server and thus is considered as dangerous where prevention, detection and reaction are imminent in case of occurrence. In this paper, the detection of attacks by distinguishing it from legal traffic is of our main concern. Initially, we categorize the parameters involved in the attacks in relation to their entities. Further, we examine different concepts and techniques from information theory and image processing domain that takes the aforementioned parameters as input and in turn decides whether an attack has occurred. In addition to that, we also pointed out the advantages for each technique, as well as any possible weakness for possible future works. � 2018 Authors.en_US
dc.description.natureFinalen_US
dc.identifier.doi10.14419/ijet.v7i2.14.11142
dc.identifier.epage8
dc.identifier.issue2
dc.identifier.scopus2-s2.0-85045378136
dc.identifier.spage5
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85045378136&doi=10.14419%2fijet.v7i2.14.11142&partnerID=40&md5=1ae3ad2c7210480fce255829e546e52d
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/24209
dc.identifier.volume7
dc.publisherScience Publishing Corporation Incen_US
dc.sourceScopus
dc.sourcetitleInternational Journal of Engineering and Technology(UAE)
dc.titleEntity entity -based parameterization for distinguishing distributed denial of service from flash eventsen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections