Mots-clés : classification.
@article{VUU_2018_28_3_a9,
author = {A. E. Krasnov and E. N. Nadezhdin and D. N. Nikol'skii and D. S. Repin and V. S. Galyaev},
title = {Detecting {DDoS} attacks by analyzing the dynamics and interrelation of network traffic characteristics},
journal = {Vestnik Udmurtskogo universiteta. Matematika, mehanika, kompʹ\^uternye nauki},
pages = {407--418},
year = {2018},
volume = {28},
number = {3},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/VUU_2018_28_3_a9/}
}
TY - JOUR AU - A. E. Krasnov AU - E. N. Nadezhdin AU - D. N. Nikol'skii AU - D. S. Repin AU - V. S. Galyaev TI - Detecting DDoS attacks by analyzing the dynamics and interrelation of network traffic characteristics JO - Vestnik Udmurtskogo universiteta. Matematika, mehanika, kompʹûternye nauki PY - 2018 SP - 407 EP - 418 VL - 28 IS - 3 UR - http://geodesic.mathdoc.fr/item/VUU_2018_28_3_a9/ LA - ru ID - VUU_2018_28_3_a9 ER -
%0 Journal Article %A A. E. Krasnov %A E. N. Nadezhdin %A D. N. Nikol'skii %A D. S. Repin %A V. S. Galyaev %T Detecting DDoS attacks by analyzing the dynamics and interrelation of network traffic characteristics %J Vestnik Udmurtskogo universiteta. Matematika, mehanika, kompʹûternye nauki %D 2018 %P 407-418 %V 28 %N 3 %U http://geodesic.mathdoc.fr/item/VUU_2018_28_3_a9/ %G ru %F VUU_2018_28_3_a9
A. E. Krasnov; E. N. Nadezhdin; D. N. Nikol'skii; D. S. Repin; V. S. Galyaev. Detecting DDoS attacks by analyzing the dynamics and interrelation of network traffic characteristics. Vestnik Udmurtskogo universiteta. Matematika, mehanika, kompʹûternye nauki, Tome 28 (2018) no. 3, pp. 407-418. http://geodesic.mathdoc.fr/item/VUU_2018_28_3_a9/
[1] Zeb K., Baig O., Asif M. K., “DDoS attacks and countermeasures in cyberspace”, 2015 2nd World Symposium on Web Applications and Networking (WSWAN), IEEE, 2015 | DOI | Zbl
[2] Singh K., Dhindsa K. S., Bhushan B., “Distributed defense: an edge over centralized defense against DDoS attacks”, International Journal of Computer Network and Information Security (IJCNIS), 9:3 (2017), 36–44
[3] Bhattacharyya D. K., Kalita J. K., DDoS attacks: evolution, detection, prevention, reaction, and tolerance, CRC Press, 2016, 312 pp.
[4] Li M., “An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition”, Computers and Security, 23:7 (2004), 549–558 | DOI
[5] Yu S., Zhou W., Jia W., Guo S., Xiang Y., Tang F., “Discriminating DDoS attacks from flash crowds using flow correlation coefficient”, IEEE Transactions on Parallel and Distributed Systems, 23:6 (2012), 1073–1080 | DOI
[6] Jin S., Yeung D. S., “A covariance analysis model for DDoS attack detection”, 2004 IEEE International Conference on Communications, IEEE, 2004, IEEE Cat. No 04CH37577 | DOI
[7] Wu Z., Wang M., Zhang H., Liu X., “Correlation-based detection of LDoS attack”, Journal of Software, 7:10 (2012) | DOI
[8] Kotenko I., Fedorchenko A., Saenko I., Kushnerevich A., “Big data technologies for security event correlation based on event type accounting”, Voprosy Kiberbezopasnosti, 2017, no. 5 (24), 2–16 | DOI
[9] “Cheng C. M., Kung H. T., Tan K. S.”, Global Telecommunications Conference, GLOBECOM '02, IEEE, 2002 | DOI
[10] Chen Y., Hwang K., “Spectral analysis of TCP flows for defense against reduction-of-quality attacks”, 2007 IEEE International Conference on Communications, IEEE, 2007 | DOI
[11] Fouladi R. F., Seifpoor T., Anarim E., “Frequency characteristics of DoS and DDoS attacks”, 2013 21st Signal Processing and Communications Applications Conference (SIU), IEEE, 2013 | DOI | Zbl
[12] Fouladi R. F., Kayatas C. E., Anarim E., “Frequency based DDoS attack detection approach using naive Bayes classification”, 2016 39th International Conference on Telecommunications and Signal Processing (TSP), IEEE, 2016 | DOI | MR
[13] Li L., Lee G., “DDoS attack detection and wavelets”, Telecommunication Systems, 28:3–4 (2005), 435–451 | DOI
[14] Li M., Li M., “A new approach for detecting DDoS attacks based on wavelet analysis”, 2009 2nd International Congress on Image and Signal Processing, IEEE, 2009 | DOI
[15] Salagean M., Firoiu I., “Anomaly detection of network traffic based on analytical discrete wavelet transform”, 2010 8th International Conference on Communications, IEEE, 2010 | DOI | Zbl
[16] Dingde J., Wenda Q., Laisen N., Cheng Y., Rongfang L., “Time-frequency detection algorithm of network traffic anomalies”, International Proceedings of Computer Science and Information Technology, 36 (2012), 103–108 http://www.ipcsit.com/vol36/021-ICIIM2012-M0053.pdf
[17] Cheng J., Yin J., Liu Y., Cai Z., Wu C., “DDoS attack detection using IP address feature interaction”, 2009 International Conference on Intelligent Networking and Collaborative Systems, IEEE, 2009 | DOI
[18] Galayev V. S., Krasnov A. E., Nikol'skii D. N., Repin D. S., “The space of structural features for increasing the efficiency of the algorithms for detecting network attacks, based on the detection of anomalies in the traffic of extremely large volumes”, International Journal of Applied Engineering Research, 12:21 (2017), 10781–10790 http://www.ripublication.com/ijaer17/ijaerv12n21_35.pdf
[19] Demidovich B. P., Lectures on the mathematical theory of stability, Nauka, M., 1967, 472 pp.
[20] Sitenko A. G., Theory of scattering, course of lectures, Vishcha Shkola, Kiev, 1975, 256 pp.
[21] Peano G., “Integration par series des equations differentielles lineaires”, Mathematische Annalen, 32:3 (1888), 450–456 | DOI | MR
[22] Dyson F. J., “The radiation theories of Tomonaga, Schwinger, and Feynman”, Physical Review, 75:3 (1949), 486–502 | DOI | MR | Zbl
[23] Krasnov A. E., Nadezhdin E. N., Nikol'skii D. N., Galyaev V. S., “Application of the evolution operator method to the analysis of multidimensional time series”, Algebra, Number Theory and Discrete Geometry: modern problems and applications, Proceedings of XV International Conference dedicated to the centenary of the birth of Professor Nikolai Mikhailovich Korobov, Tula State Pedagogical University, Tula, 2018, 313–316 (in Russian)
[24] Wald A., Sequential analysis, J. Wiley Sons, Inc., New York, 1947, 212 pp. | MR | Zbl
[25] Krasnov A. E., Nadezhdin E. N., Galayev V. S., Zykova E. A., Nikol'skii D. N., Repin D. S., “DDoS attack detection based on network traffic phase coordinates analysis”, International Journal of Applied Engineering Research, 13:8 (2018), 5647–5654 http://www.ripublication.com/ijaer18/ijaerv13n8_11.pdf