Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wu, Yi-Chi | en_US |
dc.contributor.author | Tseng, Huei-Ru | en_US |
dc.contributor.author | Yang, Wuu | en_US |
dc.contributor.author | Jan, Rong-Hong | en_US |
dc.date.accessioned | 2014-12-08T15:37:51Z | - |
dc.date.available | 2014-12-08T15:37:51Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.issn | 1743-8225 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/26033 | - |
dc.identifier.uri | http://dx.doi.org/10.1504/IJAHUC.2011.038998 | en_US |
dc.description.abstract | In Distributed Denial-of-Service (DDoS) Attack, an attacker breaks into many innocent computers (called zombies). Then, the attacker sends a large number of packets from zombies to a server, to prevent the server from conducting normal business operations. We design a DDoS-detection system based on a decision-tree technique and, after detecting an attack, to trace back to the attacker's locations with a traffic-flow pattern-matching technique. Our system could detect DDoS attacks with the false positive ratio about 1.2-2.4%, false negative ratio about 2-10%, and find the attack paths in traceback with the false negative rate 8-12% and false positive rate 12-14%. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | DDoS detection | en_US |
dc.subject | attacker traceback | en_US |
dc.subject | decision tree | en_US |
dc.subject | grey relational analysis | en_US |
dc.title | DDoS detection and traceback with decision tree and grey relational analysis | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1504/IJAHUC.2011.038998 | en_US |
dc.identifier.journal | INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING | en_US |
dc.citation.volume | 7 | en_US |
dc.citation.issue | 2 | en_US |
dc.citation.spage | 121 | en_US |
dc.citation.epage | 136 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000288319400006 | - |
dc.citation.woscount | 5 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.