Please use this identifier to cite or link to this item: https://open.uns.ac.rs/handle/123456789/1976
DC FieldValueLanguage
dc.contributor.authorPetković, Milicaen
dc.contributor.authorBašičević, Ilijaen
dc.contributor.authorKukolj, Draganen
dc.contributor.authorPopović, Miroslaven
dc.date.accessioned2019-09-23T10:18:53Z-
dc.date.available2019-09-23T10:18:53Z-
dc.date.issued2018-01-01en
dc.identifier.issn18200214en
dc.identifier.urihttps://open.uns.ac.rs/handle/123456789/1976-
dc.description.abstract© 2018, ComSIS Consortium. All rights reserved. The detection of distributed denial of service (DDoS) attacks based on internet traffic anomalies is a method which is general in nature and can detect unknown or zero-day attacks. One of the statistical characteristics used for this purpose is network traffic entropy: a sudden change in entropy may indicate a DDoS attack. However, this approach often gives false positives, and this is the main obstacle to its wider deployment within network security equipment. In this paper, we propose a new, two-step method for detection of DDoS attacks. This method combines the approaches of network traffic entropy and the Takagi-Sugeno-Kang fuzzy system. In the first step, the detection process calculates the entropy distribution of the network packets. In the second step, the Takagi-Sugeno-Kang fuzzy system (TSK-FS) method is applied to these entropy values. The performance of the TSK-FS method is compared with that of the typically used approach, in which cumulative sum (CUSUM) change point detection is applied directly to entropy time series. The results show that the TSK-FS DDoS detector reaches enhanced sensitivity and robustness in the detection process, achieving a high true-positive detection rate and a very low false-positive rate. As it is based on entropy, this combined method retains its generality and is capable of detecting various types of attack.en
dc.relation.ispartofComputer Science and Information Systemsen
dc.titleEvaluation of takagi-sugeno-kang fuzzy method in entropy-based detection of DDoS attacksen
dc.typeJournal/Magazine Articleen
dc.identifier.doi10.2298/CSIS160905039Pen
dc.identifier.scopus2-s2.0-85041627627en
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/85041627627en
dc.relation.lastpage162en
dc.relation.firstpage139en
dc.relation.issue1en
dc.relation.volume15en
item.grantfulltextnone-
item.fulltextNo Fulltext-
crisitem.author.deptFakultet tehničkih nauka, Departman za energetiku, elektroniku i telekomunikacije-
crisitem.author.deptFakultet tehničkih nauka, Departman za računarstvo i automatiku-
crisitem.author.deptFakultet tehničkih nauka, Departman za računarstvo i automatiku-
crisitem.author.parentorgFakultet tehničkih nauka-
crisitem.author.parentorgFakultet tehničkih nauka-
crisitem.author.parentorgFakultet tehničkih nauka-
Appears in Collections:FTN Publikacije/Publications
Show simple item record

SCOPUSTM   
Citations

10
checked on May 20, 2023

Page view(s)

30
Last Week
9
Last month
0
checked on May 10, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.