International Journal of Soft Computing

Year: 2014
Volume: 9
Issue: 4
Page No. 219 - 225

UDP Worm Detection in IPv6 Networks Using Entropy Variations

Authors : D. Balamurugan, P. Shanmugaraja, S. Chandrasekar and D. Jayaprakash

References

Anitha, G., 2012. Reliable Determination of zombies based on entropy variation. J. Comput. Applic., 5: 257-260.
Direct Link  |  

Anusha, J., 2011. Entropy based detection of DDOS attacks. Int. J. Soft Comput. Eng., 1: 564-567.

Caicedo, C.E., J.B.D. Joshi and S.R. Tuladhar, 2009. Ipv6 security challenges. Computer, 42: 36-42.
CrossRef  |  

Khanna, S., S.S. Venkatesh, O. Fatemieh, F. Khan and C.A. Gunter, 2012. Adaptive selective verification: An efficient adaptive countermeasure to thwart DoS attacks. IEEE/ACM Trans. Networking, 20: 715-728.
CrossRef  |  Direct Link  |  

Lee, S.M., D.S. Kim, J.H. Lee and J.S. Park, 2012. Detection of DDoS attacks using optimized traffic matrix. Comput. Math. Appl., 6: 501-510.
CrossRef  |  

Li, B., G. Bebis, J. Springer and M.H. Gunes, 2013. A survey of network flow applications. J. Network Comput. Applic., 36: 567-581.
CrossRef  |  Direct Link  |  

Rodriguez, D.M. D. Torrez-Romain, C. Vargas-Rosales and P. Vearde-Alvarado, 2008. Entropy based analysis of worm attacks in a local network. Adv. Comput. Sci. Eng., 34: 225-235.

Sun, Y.Y., C. Zhang, K.N. Lu, S.Q. Meng and K.N. Lu, 2011. Modified deterministic packet marking for DDoS attack traceback in IPv6 network. Proceedings of the 11th International Conference on Computer and Information Technology, August 31-September 2, 2011, Pafos, pp: 245-248.

Waddington, D.G. and F. Chang, 2002. Realizing the transition to IPv6. IEEE Commun. Magazine, 40: 138-147.
CrossRef  |  

Wang, F., H. Wang, X. Wang and J. Su, 2012. A new multistage approach to detect subtle DDoS attacks. Elsivier J. Math. Comput. Mod., 55: 198-213.
CrossRef  |  Direct Link  |  

Yang X. and T. Ma, 2009. A link signature based DDoS attacker tracing algorithm under IPv6. Int. J. Secur. Applic., 1: 27-36.
CrossRef  |  

Yang, X., T. Ma and Y. Shi, 2007. Typical DoS/DDoS threats under IPv6. Proceedings of the International Multi-Conference on Computing in the Global Information Technology, March 4-9, 2007, Gosier, Guadaloupe, pp: 55-.

Yu, S. and W. Zhou, 2008. Entropy-based collaborative detection of DDOS attacks on community networks. Proceedings of the 6th Annual International Conference on Pervasive Computing and Communications, March 17, 2008, Piscataway, New Jersy, pp: 566-571.

Yu, S., W. Zhou, R. Doss and W. Jia, 2011. Traceback of DDoS attacks using entropy variations. Trans. Parallel Distrib. Syst., 22: 412-425.
CrossRef  |  Direct Link  |  

Zhang, C., J. Yin, W. Chen, X. Luo and Z. Cai, 2012. Flow level detection and filtering of low-rate DDoS. Elsivier J. Comput. Networks, 56: 3417-3431.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved