Acknowledgement
The Ministry of Science and Technology partially supported this research, Taiwan (ROC), under contract nos. MOST 109-2221-E-468-011-MY3, MOST 108-2410-H-468-023, and MOST 108-2622-8-468-001-TM1. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
References
- W. Eddy, TCP SYN flooding attacks and common mitigations, RFC 4987, Aug. 2007.
- M. Hussain, J. Ren, and A. Akram, Classification of DoS attacks in wireless sensor network with artificial neural network, Int. J. Netw. Secur. 22 (2020), no. 3, 542-549.
- M. Handley and E. Rescorla, IAB, internet denial-of-service considerations, RFC 4732, Nov. 2006.
- Y. Zhao, W. Cui, and Y. Feng, A detection method based on behavior-path representation against application-layer DDoS attacks, Int. J. Netw. Secur. 23 (2021), no. 2, 229-237.
- J. Postel, Transmission control protocol-DARPA internet program protocol specification, RFC 793, Sept. 1981.
- S. Sedaghat, The forensics of DDoS attacks in the fifth generation mobile networks based on software-defined networks, Int. J. Netw. Secur. 22 (2020), no. 1, 41-53.
- C. Sorrells and L. Qian, Quickest detection of denial-of-service attacks in cognitive wireless networks, Int. J. Netw. Secur. 16 (2014), no. 6, 468-476.
- S. Ghanti and G. M. Naik, Defense techniques of SYN flood attack characterization and comparisons, Int. J. Netw. Secur. 20 (2018), no. 4, 721-729.
- M. Geva, A. Herzberg, and Y. Gev, Bandwidth distributed denial of service: Attacks and defenses, IEEE Secur. Priv. 1 (2014), 54-61.
- B. Mihajlov and M. Bogdanoski, Analysis of the WSN MAC protocols under jamming DoS attack, Int. J. Netw. Secur. 16 (2014), no. 4, 304-312.
- I. H. Supriyanto et al., Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods, IETE Technic. Rev. 30 (2013), no. 1, 64-71. https://doi.org/10.4103/0256-4602.107341
- L. Y. Benga et al., A survey of intrusion alert correlation and its design considerations, IETE Technic. Rev. 31 (2014), no. 3, 233-240. https://doi.org/10.1080/02564602.2014.906864
- C. Callegari, S. Giordano, and M. Pagano, Entropy-based network anomaly detection, in Proc. Int. Conf. Comput., Netw. Commun. (Silicon Valley, CA, USA), Jan. 2017.
- A. A. Waskita, H. Suhartanto, and L. T. Handoko, A performance study of anomaly detection using entropy method, in Proc. Int. Conf. Comput., Contr., Inf. Its. Appl. (Tangerang, Indonesia), Oct. 2016.
- S. K. Gautam and H. Om, Anomaly detection system using entropy based technique, in Proc. Int. Conf. Next Gener. Comput. Technol. (Dehradun, India), Sept. 2015.
- H. Wang, D. Zhang and K. G. Shin, Detecting SYN flooding attacks, in Proc. Annu. Joint Conf. IEEE Comput. Commun. Soc. (New York, NY, USA), June 2002.
- V. A. Siris and F. Papaglou, Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, in Proc. IEEE Glob. Telecommun. Conf. (Dallas, TX, USA), Nov. 2004.
- J. Yu et al., Traffic Flooding Attack Detection with SNMP MIB Using SVM, Comput. Comm. 31 (2008), no. 17, 4212-4219. https://doi.org/10.1016/j.comcom.2008.09.018
- H. C. Chen et al., An approach for detecting flooding attack based on integrated entropy measurement in e-mail server, in Advanced Technologies, Embedded and Multimedia for Human-centric Computing, vol. 260, Springer, Dordrecht, Netherlands, 2014, pp. 941-952.
- J. Myers and M. Rose, Post office protocol-Version 3, RFC 1939, May 1996.
- M. Bellaiche and J. Gregoire, SYN flooding attack detection based on entropy computing, in Proc. IEEE Glob. Telecommun. Conf. (Honolulu, HI, USA), Nov. 2009.
- C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J. 27 (1948no. 3, 379-423 & 623-656.
- H. C. Chen et al., A New Approach for Detecting SMTPFA Based on Entropy Measurement, in Proc. IFIP Int. Conf. Netw. Parall. Comput. (Gwangju, Korea), Sept. 2012, pp. 349-359.
- J. Klensin, Simple mail transfer protocol, RFC5321, Oct. 2008.
- M. Crispin, Internet message access protocol-Version 4, RFC 3501, Mar. 2003.
- R. Fielding et al., Hypertext transfer protocol - HTTP/1.1, RFC 2616, June 1999.