Ontology type: schema:ScholarlyArticle
2017-03
AUTHORSDebojit Boro, Dhruba K. Bhattacharyya
ABSTRACTHigh-rate distributed denial of service (HDDoS) flooding attacks pose as a major threat to the Internet. Most present solutions based on machine learning approach are inept for detecting the attacks in real time due to high processing overhead. In this paper, we present a defense solution referred to as DyProSD that combines both the merits of feature-based and statistical approach to handle HDDoS flooding attacks. The statistical module marks the suspicious traffic and forwards to an ensemble of classifiers for ascertaining the traffic as malicious or normal. Our method filters the attack traffic protocol specifically by allocating various protocol specific filter engines dynamically. As and when DDoS attack occurs and the load of a filter engine reaches beyond its capable limit, a new filter engine is recruited dynamically from the idle resource pool for filtering, thus guaranteeing the quality of service for legitimate users concurrently. We establish the effectiveness of DyProSD through several experimental analysis and real-world dataset experiments and the results indicate enough confidence in favour of our solution. More... »
PAGES593-611
http://scigraph.springernature.com/pub.10.1007/s00542-016-2978-0
DOIhttp://dx.doi.org/10.1007/s00542-016-2978-0
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1020316127
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Artificial Intelligence and Image Processing",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Tezpur University",
"id": "https://www.grid.ac/institutes/grid.45982.32",
"name": [
"Department of Computer Science and Engineering, Tezpur University, 784028, Tezpur, India"
],
"type": "Organization"
},
"familyName": "Boro",
"givenName": "Debojit",
"id": "sg:person.016606107522.74",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016606107522.74"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Tezpur University",
"id": "https://www.grid.ac/institutes/grid.45982.32",
"name": [
"Department of Computer Science and Engineering, Tezpur University, 784028, Tezpur, India"
],
"type": "Organization"
},
"familyName": "Bhattacharyya",
"givenName": "Dhruba K.",
"id": "sg:person.013101457343.35",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013101457343.35"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1016/0165-1684(89)90079-0",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004906883"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/0165-1684(89)90079-0",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004906883"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-15257-3_12",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1008617719",
"https://doi.org/10.1007/978-3-642-15257-3_12"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-15257-3_12",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1008617719",
"https://doi.org/10.1007/978-3-642-15257-3_12"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/505659.505664",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1011418880"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10462-009-9124-7",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017758686",
"https://doi.org/10.1007/s10462-009-9124-7"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10462-009-9124-7",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017758686",
"https://doi.org/10.1007/s10462-009-9124-7"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s10462-009-9124-7",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017758686",
"https://doi.org/10.1007/s10462-009-9124-7"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/s0893-6080(05)80023-1",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1020902633"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1155/2009/692654",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1027843844",
"https://doi.org/10.1155/2009/692654"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1016/j.comcom.2012.04.002",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1037435296"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1145/511446.511485",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1042183079"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1002/j.1538-7305.1948.tb01338.x",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1052867467"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/mcas.2006.1688199",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061389638"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/tdsc.2014.2302298",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061585437"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1504/ijica.2015.073004",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1067461900"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.4304/jnw.8.4.858-865",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1072451193"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/lcn.2011.6115504",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094746182"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/honet.2013.6729754",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095243870"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/ccnc.2011.5766474",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095345470"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1613/jair.614",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1105579486"
],
"type": "CreativeWork"
}
],
"datePublished": "2017-03",
"datePublishedReg": "2017-03-01",
"description": "High-rate distributed denial of service (HDDoS) flooding attacks pose as a major threat to the Internet. Most present solutions based on machine learning approach are inept for detecting the attacks in real time due to high processing overhead. In this paper, we present a defense solution referred to as DyProSD that combines both the merits of feature-based and statistical approach to handle HDDoS flooding attacks. The statistical module marks the suspicious traffic and forwards to an ensemble of classifiers for ascertaining the traffic as malicious or normal. Our method filters the attack traffic protocol specifically by allocating various protocol specific filter engines dynamically. As and when DDoS attack occurs and the load of a filter engine reaches beyond its capable limit, a new filter engine is recruited dynamically from the idle resource pool for filtering, thus guaranteeing the quality of service for legitimate users concurrently. We establish the effectiveness of DyProSD through several experimental analysis and real-world dataset experiments and the results indicate enough confidence in favour of our solution.",
"genre": "research_article",
"id": "sg:pub.10.1007/s00542-016-2978-0",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": [
{
"id": "sg:journal.1294787",
"issn": [
"0946-7076",
"1432-1858"
],
"name": "Microsystem Technologies",
"type": "Periodical"
},
{
"issueNumber": "3",
"type": "PublicationIssue"
},
{
"type": "PublicationVolume",
"volumeNumber": "23"
}
],
"name": "DyProSD: a dynamic protocol specific defense for high-rate DDoS flooding attacks",
"pagination": "593-611",
"productId": [
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"60cd082256c98ddde5f011ade22ab12f74e070b99579cb48ebf1026fe4b6ba2b"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/s00542-016-2978-0"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1020316127"
]
}
],
"sameAs": [
"https://doi.org/10.1007/s00542-016-2978-0",
"https://app.dimensions.ai/details/publication/pub.1020316127"
],
"sdDataset": "articles",
"sdDatePublished": "2019-04-11T00:28",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8695_00000585.jsonl",
"type": "ScholarlyArticle",
"url": "http://link.springer.com/10.1007%2Fs00542-016-2978-0"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s00542-016-2978-0'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s00542-016-2978-0'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s00542-016-2978-0'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s00542-016-2978-0'
This table displays all metadata directly associated to this object as RDF triples.
122 TRIPLES
21 PREDICATES
44 URIs
19 LITERALS
7 BLANK NODES