Techniques to Differentiate DDOS Attacks from Flash Crowd

  • Science C
  • Engineering S
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Flash crowds and DDOS attacks have very similar properties in terms of internet traffic. DDOS attacks are malicious requests that does not need to be handled by a server and flash crowd consist of legitimate requests, the server has responsibility to handle as many requests as possible during a flash event. So the attack flows are generated by the same pre built programs (attack tools), whereas the flash crowds come from the randomly distributed users all over the Internet. So in this paper, we aim to differentiate DDOS attack flows from flash crowds based on the following methods: Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance and Probability Metrics.

Cite

CITATION STYLE

APA

Science, C., & Engineering, S. (2013). Techniques to Differentiate DDOS Attacks from Flash Crowd. International Journal of Advanced Research in Computer Science and Software Engineering, 3(6), 295–299. Retrieved from http://www.ijarcsse.com/docs/papers/Volume_3/6_June2013/V3I5-0442.pdf

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free