CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS
This study presents a new method for detecting Shrew DDoS (Distributed Denial of Service) attacks and analyzes the characteristics of the Shrew DDoS attack. Shrew DDoS is periodic to be suitable for the server’s TCP (Transmission Control Protocol) timer. It has lower maximum to bypass peak detection...
Main Authors: | Cheng Huang, Ping Yi, Futai Zou, Yao Yao, Wei Wang, Ting Zhu |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2019/6705347 |
Similar Items
-
DDoS: Ett evolverande fenomen / DDoS: An evolving phenomenon
by: Andersson, Emil
Published: (2012) -
DDoS-skydd för hemanvändare : En studie kring DDoS
by: Sönnerfors, Peter, et al.
Published: (2014) -
TCP-based DDoS Detection Scheme
by: Cheng Kao, et al.
Published: (2012) -
Detecting the DDoS attack for SDN Controller
by: D. Glăvan
Published: (2019-06-01) -
DDoS defense by offense
by: Walfish, Michael, et al.
Published: (2012)