dc.contributor.author | Ivannikova, Elena | |
dc.contributor.author | Zolotukhin, Mikhail | |
dc.contributor.author | Hämäläinen, Timo | |
dc.contributor.editor | Yan, Zheng | |
dc.contributor.editor | Molva, Refik | |
dc.contributor.editor | Mazurczyk, Wojciech | |
dc.contributor.editor | Kantola, Raimo | |
dc.date.accessioned | 2017-09-13T09:50:37Z | |
dc.date.available | 2018-07-26T21:35:27Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Ivannikova, E., Zolotukhin, M., & Hämäläinen, T. (2017). Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. In Z. Yan, R. Molva, W. Mazurczyk, & R. Kantola (Eds.), <i>Network and System Security : 11th International Conference, NSS 2017 Helsinki, Finland, August 21–23, 2017, Proceedings</i> (pp. 531-543). Springer. Lecture Notes in Computer Science, 10394. <a href="https://doi.org/10.1007/978-3-319-64701-2_40" target="_blank">https://doi.org/10.1007/978-3-319-64701-2_40</a> | |
dc.identifier.isbn | 978-3-319-64700-5 | |
dc.identifier.other | CONVID_27211915 | |
dc.identifier.other | TUTKAID_74946 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/55347 | |
dc.description.abstract | With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from network flows and, therefore, is suitable for detecting attacks that utilize encrypted protocols. The proposed detection approach is comprised of the extraction of normal user behavior patterns and detection of anomalies that significantly deviate from these patterns. The algorithm is evaluated using DDoS detection system prototype. Simulation results show that intermediate application-layer DDoS attacks can be properly detected, while the number of false alarms remains low. | |
dc.format.extent | 762 | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Network and System Security : 11th International Conference, NSS 2017 Helsinki, Finland, August 21–23, 2017, Proceedings | |
dc.relation.ispartofseries | Lecture Notes in Computer Science | |
dc.subject.other | DDoS attack | |
dc.subject.other | anomaly detection | |
dc.subject.other | SDN | |
dc.subject.other | clustering | |
dc.subject.other | behavior pattern | |
dc.subject.other | probabilistic model | |
dc.title | Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-201709113700 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.date.updated | 2017-09-11T12:15:09Z | |
dc.relation.isbn | 978-3-319-64700-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 531-543 | |
dc.relation.issn | 0302-9743 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Springer International Publishing AG 2017. This is a final draft version of an article whose final and definitive form has been published by Springer. Published in this repository with the kind permission of the publisher. | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | International Conference on Network and System Security | |
dc.relation.doi | 10.1007/978-3-319-64701-2_40 | |
dc.type.okm | A4 | |