bound maxima as a traffic feature under d do s flood attacks
TRANSCRIPT
Article Name: Bound Maxima as a Traffic Feature under DDoS Flood Attacks.
Author: Jie Xue, Ming Li, Wei Zhao, and Sheng-Yong Chen
Hindawi Publishing Corporation Mathematical Problems in Engineering
Volume 2012, Article ID 419319, 20 pagesDoi: 10.1155/2012/419319
Distribute denial of service.
They have been a lot of attacks to different kinds of web sites, therefore, intrusion detection
system (ISD) for detecting DDoS flood attacks has been greatly desired.
There are two categories regarding IDSs. One is misuse detection and the other anomaly
detection. Attacking alerts given by misuse detection is primarily based on a library of
known signatures to match against network traffic. While DDoS attacks continue to be a
problem, there is currently not much quantitative date available for researchers to study the
behaviors of DDoS flood attacks. Roughly, high rate is the radical feature of attack-
contained traffic. The paper reported the real events in 2000. He noticed that the attacks
inundated servers with 1 gigabit per second of incoming data, which is much more traffic
than they were built to handle. In conclusion this article talks about all the investigations
and experimental results that they have done to try to stop all the DDoS attacks and make
web services more efficient.