Виявлення мережевих атак за допомогою Ентропії.
Анотація
Проблема розподіленого відмови в обслуговуванні (DDoS) - це поширена проблема сьогодні. Існує безліч способів виявлення цього типу атак. В статті розглядається метод Ентропії
Посилання
SAM COOK DDoS attack statistics and facts for 2018-2019 [Electronic resource] // - Access mode: https://www.comparitech.com/blog/information-security/dDoS-statistics-facts/
Current cyber threats - 2018. Trends and forecasts Date of publication March 12, 2019 [Electronic resource] // - Access mode: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-2018/
Kupreev O. DDoS-attacks in the second quarter of 2019 [Electronic resource] O. Kupreev, E. Badovskaya, A. Gutnikov // - Access mode: https://securelist.ru/dDoS-report-q2-2019/ 94452 /
Kupreev O. DDoS-attacks in the third quarter of 2018 [Electronic resource] / O. Kupreev, E. Badovskaya, A. Gutnikov // - Access mode: https://securelist.ru/dDoS-report-in-q3 -2018 / 92512 /
DoS-attack on the server [Electronic resource] // - Access mode: https://i-exam.ru/node/542
Gresko A. General comprehensive description of information security problems in the "Internet of Things" / A. Gresko, Y. Shcheblanin // Modern information security. - 2016. - № 1. - p. 69-73.
Smoktiy O. Analysis of the mechanism and consequences of the impact of DDoS-attacks on the reference model of interaction of open OSI systems / O. Smoktiy, K. Smoktiy, O. Ivanchenko // Control, navigation and communication systems. - 2017. - № 1. - p.33-37.
Types of DDoS-attacks and algorithm for detecting DDoS-attacks of flood-attack type / [N. Bagniuk, V. Melnyk, O. Klekha, I. Nevidomsky] // Computer-integrated technologies: education, science, production. - 2015. - № 18. - P.6-12.
Protection against DDoS attacks with your own hands [Electronic resource] // - Access mode: https://geekelectronics.org/linux/zashhita-ot-dDoS-atak-svoimi-rukami.html
DOS and DDoS-attacks: the concept, types, methods of detection and protection [Electronic resource] - Mode of access to the resource: https://compconfig.ru/net/dos-i-ddos-ataki.html.
Babenko T. Investigation of entropy of network traffic as an indicator of DDOS-attacks / TV Babenko
Digital Attack MapTop [Electronic resource] - Mode of access to the resource
Reiher P. A taxonomy of DDoS attack and DDoS Defense mechanisms [Electronic resource] / P. Reiher, J. Mirkovic - Mode of access to the resource: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.879.9772&rep=rep1&type=pdf.


