{"title":"DDoS检测和区分的闪光事件:一个简短的审查","authors":"A. Dhingra, M. Sachdeva","doi":"10.1109/ICSCCC.2018.8703335","DOIUrl":null,"url":null,"abstract":"Although there has been an immense advancement in the robustness of IT infrastructure, the organizations still face downtimes, lasting for short periods and even continuing for days. This could be due to malicious requests, deliberately sent to disrupt the services or the volume of legitimate users trying to access the website. Detection of these network traffic anomalies and then categorizing them as DDoS Attack or Flash event, is a challenging task in the front of network security researchers. This paper reviews and summarizes the details and scenarios of these anomalies. It highlights the various features, parameters and metrics used in research till date to detect these anomalies and distinguish the legitimate request from the malicious one. The intent of paper is to guide researchers in selecting efficient parameters in order to obtain accurate results with low false positives. It highlights the list of characteristics to discriminate the two traffic patterns has been proposed for better understanding of the problem. Thus, the paper is expected to help academicians and researchers find effective solution for the above-mentioned anomalous behavior of the network traffic.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"DDoS detection and discrimination from flash events: a compendious review\",\"authors\":\"A. Dhingra, M. Sachdeva\",\"doi\":\"10.1109/ICSCCC.2018.8703335\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although there has been an immense advancement in the robustness of IT infrastructure, the organizations still face downtimes, lasting for short periods and even continuing for days. This could be due to malicious requests, deliberately sent to disrupt the services or the volume of legitimate users trying to access the website. Detection of these network traffic anomalies and then categorizing them as DDoS Attack or Flash event, is a challenging task in the front of network security researchers. This paper reviews and summarizes the details and scenarios of these anomalies. It highlights the various features, parameters and metrics used in research till date to detect these anomalies and distinguish the legitimate request from the malicious one. The intent of paper is to guide researchers in selecting efficient parameters in order to obtain accurate results with low false positives. It highlights the list of characteristics to discriminate the two traffic patterns has been proposed for better understanding of the problem. Thus, the paper is expected to help academicians and researchers find effective solution for the above-mentioned anomalous behavior of the network traffic.\",\"PeriodicalId\":148491,\"journal\":{\"name\":\"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCCC.2018.8703335\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC.2018.8703335","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DDoS detection and discrimination from flash events: a compendious review
Although there has been an immense advancement in the robustness of IT infrastructure, the organizations still face downtimes, lasting for short periods and even continuing for days. This could be due to malicious requests, deliberately sent to disrupt the services or the volume of legitimate users trying to access the website. Detection of these network traffic anomalies and then categorizing them as DDoS Attack or Flash event, is a challenging task in the front of network security researchers. This paper reviews and summarizes the details and scenarios of these anomalies. It highlights the various features, parameters and metrics used in research till date to detect these anomalies and distinguish the legitimate request from the malicious one. The intent of paper is to guide researchers in selecting efficient parameters in order to obtain accurate results with low false positives. It highlights the list of characteristics to discriminate the two traffic patterns has been proposed for better understanding of the problem. Thus, the paper is expected to help academicians and researchers find effective solution for the above-mentioned anomalous behavior of the network traffic.