Entity entity -based parameterization for distinguishing distributed denial of service from flash events

In a perfect condition, there are only normal network traffic and sometimes flash event traffics due to some eyecatching or heartbreaking events. Nevertheless, both events carry legitimate requests and contents to the server. Flash event traffic can be massive and damaging to the availability of the...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamed M.A., Jamil N., Abidin A.F., Din M.M., Nik W.N.S.W., Mamat A.R.
Other Authors: 57194596063
Format: Article
Published: Science Publishing Corporation Inc 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Tenaga Nasional
id my.uniten.dspace-24209
record_format dspace
spelling my.uniten.dspace-242092023-05-29T14:57:00Z Entity entity -based parameterization for distinguishing distributed denial of service from flash events Mohamed M.A. Jamil N. Abidin A.F. Din M.M. Nik W.N.S.W. Mamat A.R. 57194596063 36682671900 35087974100 55348871200 56521597200 57220345355 In a perfect condition, there are only normal network traffic and sometimes flash event traffics due to some eyecatching or heartbreaking events. Nevertheless, both events carry legitimate requests and contents to the server. Flash event traffic can be massive and damaging to the availability of the server. However, it can easily be remedied by hardware solutions such as adding extra processing power and memory devices and software solution such as load balancing. In contrast, a collection of illegal traffic requests produced during distributed denial of service (DDoS) attack tries to cause damage to the server and thus is considered as dangerous where prevention, detection and reaction are imminent in case of occurrence. In this paper, the detection of attacks by distinguishing it from legal traffic is of our main concern. Initially, we categorize the parameters involved in the attacks in relation to their entities. Further, we examine different concepts and techniques from information theory and image processing domain that takes the aforementioned parameters as input and in turn decides whether an attack has occurred. In addition to that, we also pointed out the advantages for each technique, as well as any possible weakness for possible future works. � 2018 Authors. Final 2023-05-29T06:57:00Z 2023-05-29T06:57:00Z 2018 Article 10.14419/ijet.v7i2.14.11142 2-s2.0-85045378136 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045378136&doi=10.14419%2fijet.v7i2.14.11142&partnerID=40&md5=1ae3ad2c7210480fce255829e546e52d https://irepository.uniten.edu.my/handle/123456789/24209 7 2 5 8 Science Publishing Corporation Inc Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description In a perfect condition, there are only normal network traffic and sometimes flash event traffics due to some eyecatching or heartbreaking events. Nevertheless, both events carry legitimate requests and contents to the server. Flash event traffic can be massive and damaging to the availability of the server. However, it can easily be remedied by hardware solutions such as adding extra processing power and memory devices and software solution such as load balancing. In contrast, a collection of illegal traffic requests produced during distributed denial of service (DDoS) attack tries to cause damage to the server and thus is considered as dangerous where prevention, detection and reaction are imminent in case of occurrence. In this paper, the detection of attacks by distinguishing it from legal traffic is of our main concern. Initially, we categorize the parameters involved in the attacks in relation to their entities. Further, we examine different concepts and techniques from information theory and image processing domain that takes the aforementioned parameters as input and in turn decides whether an attack has occurred. In addition to that, we also pointed out the advantages for each technique, as well as any possible weakness for possible future works. � 2018 Authors.
author2 57194596063
author_facet 57194596063
Mohamed M.A.
Jamil N.
Abidin A.F.
Din M.M.
Nik W.N.S.W.
Mamat A.R.
format Article
author Mohamed M.A.
Jamil N.
Abidin A.F.
Din M.M.
Nik W.N.S.W.
Mamat A.R.
spellingShingle Mohamed M.A.
Jamil N.
Abidin A.F.
Din M.M.
Nik W.N.S.W.
Mamat A.R.
Entity entity -based parameterization for distinguishing distributed denial of service from flash events
author_sort Mohamed M.A.
title Entity entity -based parameterization for distinguishing distributed denial of service from flash events
title_short Entity entity -based parameterization for distinguishing distributed denial of service from flash events
title_full Entity entity -based parameterization for distinguishing distributed denial of service from flash events
title_fullStr Entity entity -based parameterization for distinguishing distributed denial of service from flash events
title_full_unstemmed Entity entity -based parameterization for distinguishing distributed denial of service from flash events
title_sort entity entity -based parameterization for distinguishing distributed denial of service from flash events
publisher Science Publishing Corporation Inc
publishDate 2023
_version_ 1806425700366811136