Show simple item record

dc.contributor.authorIvannikova, Elena
dc.contributor.authorZolotukhin, Mikhail
dc.contributor.authorHämäläinen, Timo
dc.contributor.editorYan, Zheng
dc.contributor.editorMolva, Refik
dc.contributor.editorMazurczyk, Wojciech
dc.contributor.editorKantola, Raimo
dc.date.accessioned2017-09-13T09:50:37Z
dc.date.available2018-07-26T21:35:27Z
dc.date.issued2017
dc.identifier.citationIvannikova, E., Zolotukhin, M., & Hämäläinen, T. (2017). Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. In Z. Yan, R. Molva, W. Mazurczyk, & R. Kantola (Eds.), <i>Network and System Security : 11th International Conference, NSS 2017 Helsinki, Finland, August 21–23, 2017, Proceedings</i> (pp. 531-543). Springer. Lecture Notes in Computer Science, 10394. <a href="https://doi.org/10.1007/978-3-319-64701-2_40" target="_blank">https://doi.org/10.1007/978-3-319-64701-2_40</a>
dc.identifier.isbn978-3-319-64700-5
dc.identifier.otherCONVID_27211915
dc.identifier.otherTUTKAID_74946
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/55347
dc.description.abstractWith the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from network flows and, therefore, is suitable for detecting attacks that utilize encrypted protocols. The proposed detection approach is comprised of the extraction of normal user behavior patterns and detection of anomalies that significantly deviate from these patterns. The algorithm is evaluated using DDoS detection system prototype. Simulation results show that intermediate application-layer DDoS attacks can be properly detected, while the number of false alarms remains low.
dc.format.extent762
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartofNetwork and System Security : 11th International Conference, NSS 2017 Helsinki, Finland, August 21–23, 2017, Proceedings
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.subject.otherDDoS attack
dc.subject.otheranomaly detection
dc.subject.otherSDN
dc.subject.otherclustering
dc.subject.otherbehavior pattern
dc.subject.otherprobabilistic model
dc.titleProbabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-201709113700
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2017-09-11T12:15:09Z
dc.relation.isbn978-3-319-64700-5
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange531-543
dc.relation.issn0302-9743
dc.type.versionacceptedVersion
dc.rights.copyright© Springer International Publishing AG 2017. This is a final draft version of an article whose final and definitive form has been published by Springer. Published in this repository with the kind permission of the publisher.
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Network and System Security
dc.relation.doi10.1007/978-3-319-64701-2_40
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record