Detection of Distributed Denial of Service Attacks Using Statistical Pre-Processor and Unsupervised Neural Networks
|
|
|
- Clare Ford
- 10 years ago
- Views:
Transcription
1 Detection of Distributed Denial of Service Attacks Using Statistical Pre-Processor and Unsupervised Neural Networks Rasool Jalili 1, Fatemeh Imani-Mehr 1, Morteza Amini 1, Hamid Reza Shahriari 1 Department of Computer Engineering, Sharif University of Technology, Tehran, Iran {jalili@, imani@mehr., amini@ce., shahriari@mehr.} sharif.edu Abstract. Although the prevention of Distributed Denial of Service (DDoS) attacks is not possible, detection of such attacks plays main role in preventing their progress. In the flooding attacks, especially new sophisticated DDoS, the attacker floods the network traffic toward the target computer by sending pseudo-normal packets. Therefore, multi-purpose IDSs do not offer a good performance (and accuracy) in detecting such kinds of attacks. In this paper, a novel method for detection of DDoS attacks has been introduced based on a statistical pre-processor and an unsupervised artificial neural net. In addition, SPUNNID system has been designed based on the proposed method. The statistical pre-processing has been used to extract some statistical features of the traffic, showing the behavior of DDoS attacks. The unsupervised neural net is used to analyze and classify them as either a DDoS attack or normal. Moreover, the method has been more investigated using attacked network traffic, which has been provided from a real environment. The experimental results show that SPUNNID detects DDoS attacks accurately and efficiently. Index Terms DDoS Attacks, Intrusion Detection System, Unsupervised Neural Nets, Statistical Pre-Processor 1 Introduction Generating successful flooding DoS 1 attack on today s powerful computers is not possible using single ordinary computers. One of the solutions to have a succeed attack is to distribute the attack among a group of computers around the network. Moreover, tracing an attack originated from multiple sources is much harder than from single source attacks. Consequently, attackers can generate distributed DoS attacks and sustain any network bandwidth using thousands of computers. A DDoS attack consists of three main components: master or main attacker, slave computers, and the victim computer. The main attacker initiates the attack from the master computer and tries to find some slave computers to be involved in the attack. 1 Denial of Service
2 A small piece of software is installed on the slave computers to run the attacker commands. The attack scenario continued through a command issued from the attacker resides on the master computer toward the slave computers to run their pieces of software. The mission of the piece of software is to send dummy traffic destinated toward the victim. Therefore, the victim will not be able to do anything to prevent this attack. To reduce the network traffic, the victim should detect the attack just in time to be able to block some IP addresses. Although on time detection of an attack has an important role in preventing the progress of the attack, detection of DDoS 2 attacks is not so easy. As DDoS attack generation tools and methods try to increase traffic toward the victim computer using generating normal packets, signature based intrusion detection systems are unable to detect such attacks. In this paper a new approach to detect distributed DoS attacks using statistical perprocessor and unsupervised neural nets is presented. In this method an unsupervised artificial neural net has been used to analyze and classify extracted statistical features. The rest of the paper organized as follows: section 2 represents related works. The overall approach is described in section 3. Section 4 describes the base SPUNNID system [ 1], as the base architecture. Section 5 presents evaluation results of our method. Section 6 draws some conclusions and future works. The preparation of manuscripts which are to be reproduced by photo-offset requires special care. Papers submitted in a technically unsuitable form will be returned for retyping, or canceled if the volume cannot otherwise be finished on time. 2 Related Work Flooding attacks create enormous amount of normal packets and create anomalies in the target network traffic. Therefore, most approaches to detect such kinds of attacks, tries to detect these anomalies using semi statistical methods. In this paper, we use statistical methods to construct a Statistical Pre-Processor to extract some features, which demonstrates the behavior of DDoS attacks. Then an unsupervised neural net is used to analyze and classify these features. Accordingly, in this section we overview some research on Detection of DDoS attacks and IDSs based on unsupervised neural nets. Authors in [ 2] introduced MULTOPS data structure to detect DDoS attacks. Using the data structure, they detected DDoS attack by searching for significant asymmetries between packets to and from different subnet. AGURI [ 3] as a monitoring tool uses the traffic pattern aggregation method, to monitor the traffic in a long term and detect DDoS attacks. In [ 4] a scheme to detect DDoS attacks by monitoring the increase of new IP addresses was proposed. In addition, it was presented that a sequential change point detection algorithm can identify when an attack has occurred. In [ 5], efficient adaptive sequential and batch sequential methods for an early detection of DDoS attacks have been developed. 2 Distributed Denial of Service
3 In [ 6], the network traffic, which is expressed in terms of Tcp flag rates and protocol rates, has been analyzed and it has been shown that when the flooding attacks are in effect, intuitively the two rates can be distinctive and predictive, due to the explosion of TCP flags or specific protocol packets. In [ 7] an approach to reliably identifying signs of DDOS flood attacks based on LRD (long-range dependence) traffic pattern recognition has been discussed. In [ 8] the authors introduced an automated methodology for analyzing DoS attacks that is based on ramp-up and spectral analysis to build upon existing approaches of header analysis. This identification framework can be used as part of an automated DDoS detection and response System. In [ 9], Feinstein and Schnackenberg, present statistical methods to identify DDoS attacks by computing entropy and frequency-sorted distributions of selected packet attributes. In [ 10] the effects of multivariate correlation analysis on the DDoS detection were discussed and a covariance analysis model for detecting SYN flooding attacks was proposed. In [ 11] a combined data mining approach for modeling the traffic pattern of normal and diverse attacks was proposed. This approach used the automatic feature selection mechanism for selecting the important attributes. Some early research on IDSs attempted to use neural nets for intrusion detection. Such systems must be used in intrusion detection after initial training on normal or attack behaviors (or hybrid of theses behaviors). Both supervised and unsupervised neural nets have been used in IDSs till now such as MLFF, Recurrent, Adaptive, SOM and ART nets. In [ 12] the authors presented a robust neural network detector for Distributed Denialof-Service (DDoS) attacks in computers providing Internet services. A genetic algorithm was used to select a small number of efficient features from an extended set of 44 statistical features, which are estimated only from the packet headers. Most supervised neural net architectures require retraining in order to improve analysis capability due to changes in the input data, but unsupervised net offers increased level of adaptability to neural nets and are able to dynamically improve their analysis capability [ 13]. Most of the network-based systems in unsupervised based IDSs used self-organizing maps (SOMs) neural nets and only a few systems used other types of unsupervised neural nets. In [ 14], multiple SOMs are used for intrusion detection, where a collection of more specialized maps is used to process network traffic for each protocol separately. Each neural net was trained to recognize the normal activity of a single protocol. Most statistical methods reviewed in this section use some thresholds to detect DDoS attacks. In many cases, such thresholds cannot distinguish the normal behavior from the attack behavior precisely. In this paper, some statistical features showing the behavior of DDoS attacks have been extracted, and using unsupervised neural nets, they have been classified into normal and attack. In application phase of the neural net, this classification is used to detect DDoS attacks.
4 3 IDS for DDoS Attacks General network based intrusion detection systems are either packet based or connection based. These systems attempt to detect attacks through analyzing packet or connection templates correspondingly. In DDoS attacks, the attacker floods the network traffic toward the target computer by sending semi normal packets. Therefore, multi purpose IDSs do not have a good performance (and accuracy) in detecting such kinds of attacks. The DDoS victim, which is encountered with a vast number of normal packets, is overloaded, cannot provide services to its legitimate network users and denies them. The attacker tries to flood target network traffic with semi normal packets, but some statistical features on target network traffic will change under DDoS attack such that it becomes different from (and more complicated that) normal ones. Extraction of these features and analyze them is helpful to detect DDoS attacks. The normal network traffic of each computer depends on its user services. In addition, relatives to user services of the computer, it may be different during the day and night. Therefore, the value of some statistical features on DDoS attack generated network traffic, usually is different from values of the features on normal network traffic of the target computer. In this paper, statistical features in a minor time interval have been extracted from network traffic, and it is shown that these features in attack network traffic differ from those in normal network traffic. Using such exploited result, it is possible to detect DDoS attacks more precisely. Due to the extend of network traffic in the target computer, regardless of the type of traffic in different times, the area of our extracted statistical features is extensive. Because of high clustering power, it seems that unsupervised artificial neural net is a more suitable tool for this purpose. In this paper, provided normal and attack network traffic is divided into minor time intervals, denoted as T. The time interval T includes all packets that their timestamps agree with that interval. Then we extract our statistical features from these time intervals. These features form the training vector of neural net. A typical time interval T can be labeled as Normal or DDoS Attack relative to its attack packets rate. Neural net processes these vectors and automatically clusters them as Normal or DDoS Attack as well as belonging of them to special belong to their variety. In the application phase of neural net, packets belonging to the time interval T have been captured and statistical features have been extracted. The unsupervised neural net uses these features as input vector, clusters them, and detects their type as normal or DDoS Attack. In our previous research on IDSs, we introduced an Unsupervised Neural Net based Intrusion Detector (UNNID) system [1], which was network based. That system could detect attack through analyzing packets or connections signature. We promote UNNID system by adding the statistical pre-processor to detect DDoS attacks; yield in a new system called Statistical Pre-Processor & Unsupervised Neural Net based Intrusion Detector (SPUNNID). The architecture of SPUNNID system is presented in the next session.
5 Fig. 1. Statistical Pre-Processor and Unsupervised Neural Net based Intrusion Detector (SPUNNID) System Architecture. 4 System Architecture The architecture and main components of our SPUNNID system is shown in figure 1. The system is designed firstly to facilitate training, testing, tuning and evaluating different types of unsupervised neural nets for intrusion detection, and secondly to apply them for analyzing network traffic in on-line and off-line mode in order to classify classifying network traffic into normal and attack. In SPUNNID, Data Provider collects packets from network audited data file (off-line mode) or live network (on-line mode) and send data in the text form to the Statistical Pre-Processor component. Statistical Pre-Processor extracts some features from packets of the specified time interval using statistical techniques. The component converts extracted feature vector into the numerical form and if needed converts numerical data into binary or normalized form, and send them to Unsupervised Neural Net based Engine. The UNN-Engine uses data either for training and testing its neural net or for analyzing and detecting denial of service attacks. The analyzer output (normal or DoS attack type) is given to Responder for recording in the system log file and generating alarm in case an attack is detected. The IDS Evaluator component provides a facility for reporting true detection rate, false positive detection rate, false negative detection rate, and other criteria to evaluate our system in detect-
6 ing denial of service attacks. This component calculates these criteria by comparing the output of IDS and expected output of the system, which is determined by labels on records of test data. The criteria are: Exact True Type Detection Rate (detecting normal traffic from attack and recognizing the known attack type); True Detection Rate (only separating normal traffic from attack); False Positive Detection Rate (miss-detecting attack); False Negative Detection Rate (failing to detect attack when it is occurs); Finally the Manager & Controller component in this system manages and directs other components to work in one of the possible modes (e.g. training, testing, and detecting) based on the command and parameters delivered from the operator. 4-1 UNN-Engine One of the main components of UNNID is UNN-Engine, which has the role of analyzing the network traffic and detecting denial of service attacks using one of the convenient unsupervised neural nets named Adaptive Resonance Theory (ART) nets. In unsupervised ART nets, input patterns may be presented several times and in any order. Each time a pattern is presented, an appropriate cluster unit is chosen and related cluster weights are adjusted to let the cluster unit learn the pattern. In these nets, choosing a cluster is based on the relative similarity of an input pattern to the weight vector for a cluster unit, rather than the absolute difference between the vectors (that is used in SOM nets). As in the most cases of clustering nets, the weights on a cluster unit may be considered an exemplar (or code vector) for the patterns placed on that cluster. ART nets are designed to allow the user to control the degree of similarity of patterns placed on the same cluster that can be done by tuning the vigilance parameter in these nets. In ART nets, the number of clusters is not required to be determined in advance, so the vigilance parameter can be used to determine the proper number of clusters to decrement probability of merging different types of clusters to the same cluster. Moreover, ART nets have two other main characteristics. First is stability which means a pattern not oscillating among different cluster units at different stages of training, and second is plasticity which means the ability of net to learn a new pattern equally well at any stages of learning. Stability and plasticity of ART nets and the capability of clustering input patterns based on the user controlled similarity between them, made these nets more appropriate for using in IDSs, rather than most of other types of unsupervised nets (such as SOM) for classifying network traffic into normal and intrusive/ attack. For this purpose, we used a type of unsupervised ART nets, named ART-1. ART-1 is the first type of ART nets, which designed for clustering binary inputs. In SPUNNID, Statistical Pre-Processor feeds binary input vector to ART-1 net. In the training phase, the input vectors are clustered through ART-1 net regardless of their nature (normal or intrusive). Following the training phase, system must determine the neurons of each type of cluster and assign name to each cluster using the label of each time interval records (in train data). Each cluster has the same name as
7 its units. Each unit is named based on the type of the majority of input data that the unit represent the winning or best matching for. This reduces to constructing a Clustering Map. In the map, units are clustered together to indicate either the normal traffic, known trained attacks, or possibly a new DoS attack. New attacks may appear in abnormal traffic, which is neither a normal traffic nor a known DoS attack. 4-2 Statistical Feature selection The attacker uses flooding attacks such as UDP flood, Syn flood, ICMP flood, and ICMP Smurf to generate DDoS attacks and finally floods the target network. When the DDoS attack is being initiated, the number of packets in the network increases instantly. The number of packets may also be increased in normal network traffic. Increasing the number of packets in normal heavy network traffic and attacked network traffic cannot be distinguished easily. Analyzing the DDoS attack and the normal network traffic shows that packet rates are a better criterion for deciding about happening of the attack. Tcp flags rates and protocol rates in normal network traffic change slowly. Flooding packets, which are used by the attacker, specify the behavior of the DDoS attack and the effect of this attack in changing the statistical features. In attacked network traffic, depends on its behavior, these rates change and become different from the normal traffic. Therefore, we extracted the features that shown these rates in a typical time interval T. These features are: N ICMP : the percent of ICMP packets. N UDP : the percent of UDP packets. N TCP : the percent of TCP packets. N TCPSYN : the percent of SYN packets in TCP packets. N TCPSYNACK : the percent of SYN+ACK packets in TCP Packets. N TCPACK : the percent of ACK packets in TCP packets. A Packet Header Sizes : The packet header sizes average. A Packet Data Sizes : The packet data sizes average. After extracting these features, the neural net input vector is constructed. Fig. 2. Statistical pre-processor is similar to bus station system. The operation of Statistical Pre-Processor is similar to an operation of the Bus Station system. The packets, which have been come from Data Provider, wait for coming of a bus. The bus comes to the station every T seconds (the length of time interval), and takes captured packets to the Statistical Features Extractor component. This component processes the coming packets, extracts selected features and converts
8 d i g i t a l these features to binary or normalized form in order to feed neural net sensors in UNN-Engine component. 5 Evaluation Providing proper data (including attack and normal network traffic) play main role to get a high performance in detection of DDoS attacks. If the data covers normal traffic (during day and night) and all types of DDoS attacks, the training phase of the neural net will be done better and thus having a better performance for the net. In the following subsection, a method of gathering suitable data, for training and testing phase of the neural net, will be explained and then evaluation results will be shown. 5-1 Data Gathering Generating DDoS attacks on a real environment and gathering normal and attack data are so costly. Meanwhile it has been tried to maintain the gathered data comparable with the real one. Fig. 3. Topology of Data Gathering Network For Evaluation The network topology, shown in figure 3, is used to generate data in our evaluation. In this topology, the captured network traffic on the real environment has been replayed using the computer A. This computer plays the role of the real Computer CE 3. The computer B is considered as the DDoS attack master. To generate an attack, B orders the DDoS attack slave computers including C, D and E to initialize the attack. These computers initialize the attack through sending flooding packets into the network. These packets are compounded with the CE computer network traffic and form the traffic under DDoS attack, captured by the computer F. If DDoS attack does not flow in the network, F captures the CE normal network traffic. Finally the captured network traffic by F includes both normal and attack network traffic. The traffic of CE was captured as normal network traffic for the training and testing phase. Using the network topology, the traffic was replayed, and DDoS attack traffic was generated at once. Regarding this scenario, flooding attacks for the training data 3 The server in Department of Computer Engineering, Sharif University of technology.
9 include UDP Flood, SYN Flood, ICMP Flood, ICMP SMURF, and mixture of these flooding attacks, each flowing for a period of 15 minutes. So the generated training traffic includes normal and attack network traffic. The traffic for the testing phase was generated using this method. This traffic contains the network traffic under the DDoS attack, trough 15 minutes. 5-2 Evaluation Results Evaluation is achieved using the network topology described above. Parameters considered in the evaluation phase are: The number of clusters in ART1 neural net. The number of epochs in the training phase of ART1 neural net. The vigilance parameter of ART1 neural net. The length of the time intervals. The vigilance parameters value in the application phase of SPUNNID. The effect of these parameters has been evaluated based on the Exact True Type detection Rate (ETTR), True Detection Rate (TR), False Positive detection Rate (FPR) and False Negative detection Rate (FNR). The number of clusters in ART1 neural net Specifying the number of clusters depends on the variation of training data. Furthermore, the volume of training data and its variations depends on the length of time intervals in the introduced method. So changing the length of time intervals, results in changing the number of clustered neural net clusters. Generally, the number of clusters must cover the selected data of the training phase. The number of epochs in the training phase of ART1 neural net The next parameter, which can affect on our experimental results, is the number of epochs or iterations in neural net training phase. Our experiments show that, 100 is a good option in this regard. 100 Time Interval Length = 0.7 s Detection Percent Vigilance Value TR ETTR FPR FNR Fig. 4. The effect of changing the Vigilance value on SPUNNID detection performance. The vigilance parameter of ART1 neural net The vigilance parameter is the most important parameter that can affect on ART1 clustering and classification quality. This parameter specifies the degree of similarity of patterns placed on the same cluster. Neither high value nor low value for this
10 parameter is suitable for our system. To specify the appropriate value of vigilance parameter and its effect on the system performance, the system was trained with different vigilance values and ETTR, TR, FPR, and FNR criteria were evaluated. Results of the experiments are presented in figure 4. The results show that ART1 with vigilance value of 0.9 offers the best level of detection performance. The length of time intervals Defining the best value for the length of time interval is a tradeoff between the load of captured network traffic for training phase of ART1 neural net, the existence of enough processing power, and the expected efficiency. Neither high value nor low value for this time interval length is suitable for our system. Increasing or decreasing the length of time intervals resulted in increment or decrement of the number of neural net input data. Also in a short time interval, the number of data variation is less than the longer time interval. Thereby, the selection of longer time intervals is more efficient, if the number of training data of neural net is big sufficiently, and there is enough processing power for training of neural net. In this case, the variation and the number of clustering data become greater, thus the training power of neural net will increase. Detection Percent Vigilance Value = Time Interval Lengths (sec) TR ETR FPR FNR Fig. 5. The effect of changing the length of Time Interval on SPUNNID detection performance. Generally, the response time of the introduced method corresponds to the selected time interval length. If the length of time intervals is selected very long, the response time will increase. However, the increasing of response time is not so impressive for computer network administrators. In addition, the length of time intervals should not exceed from the length of happened DDoS attacks time. It seems that the length of time intervals cannot exceed from 2 minutes. If the training data is not very high, selection of shorter time interval can produce suitable results. The minimum length of time intervals is a value in which the effect of DDoS attacks can be represented using the selected features. For example, assume a time interval, which contains only two packets. The type of these packets cannot effect on our features so as they can use to suitable DDoS attack detection. Furthermore, these two packets cannot create a sufficient variation of selected features. Therefore, the good selection of time interval lengths is tradeoff between the load of
11 captured network traffic for training phase, the existence of enough processing power, and the expected efficiency. Figure 5 shows the best time interval length, which determines the appropriate value for time interval length in our gathered data. Detection Percent Training Vigilance Value = 0.9, T = 0.7 sec Vigilance Value of utilization phase TR ETTR FPR FNR Fig. 6. The effect of changing the vigilance value in testing phase on SPUNNID detection performance. The vigilance value in application phase of ART1 neural net One of the main disadvantages of many commercial and expert system based IDSs are their weakness in detecting changed known attacks and also new attacks. So for enhancing our system flexibility and generality we decreased system sensitivity in clustering input patterns by changing in vigilance parameter in application phase of SPUNNID system. It has been shown that the selection of the smaller value for vigilance parameter in application phase can decrease the sensitiveness of clustering in unsupervised neural net based engine. Therefore in many cases, if the value of vigilance parameter decreases, the number of Can Not Cluster messages decreases too. Figure 6 shows this obtained result for this purpose. 6 Conclusion and Feature works In this paper, we introduced a new approach for detection of DDoS attacks, using unsupervised neural nets and statistical methods. In this approach, the statistical features showing the behavior of these attacks along a minor time interval, have been extracted. The ART1 net has been used to analyze and classify these features. Evaluation results show that the approach in 94.9 percent of times is able to recognize the attacked traffic from the normal one. In addition, the introduced approach detects DDoS attack in less than a second (0.7 second in best case). One of the neural net advantages, specially unsupervised neural nets, is that it can classify the input data automatically without human intervention. Therefore, extraction of proper features to train neural nets (statistical or non-statistical) which can show the effect of a typical attack can be useful to promote detection performance. In our future investigation, we intend to use a FIFO queue of extracted statistical feature vector as the neural net input vector. When DDoS attack happens, the corre-
12 lation between our statistical parameters in some neighbor time intervals decreases. Using the queue of statistical features of the neighbor time intervals as a neural net input vector shows the change of this correlation better than considering single time interval. References 1. M. Amini, and R. Jalili, "Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)", Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS 2004), Madeira, Portugal, T. M. Gil and M. Poletter. "Multops: a data-structure for bandwidth attack detection", In Proceedings of USENIX Security Symposium'2001, R. Kaizaki, K. Cho, O. Nakamura, "Detection Denial of Service Attacks Using AGURI", International Conference Telecommunications, Beijing China, June T. Peng, C. Leckie and R. Kotagiri. "Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring", In Proceedings of the Third International IFIP-TC6 Networking Conference (Networking 2004), Athens, Greece, R. Bazek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A novel approach to detection of enial-of-service attacks via adaptive sequential and batch-sequential change-point methods", IEEE Systems, Man and Cybernetics Information Assurance Workshop, June Sanguk Noh, Cheolho Lee,Gihyun Jung, Kyunghee Choi, Using Inductive Learning for the Detection of Distributed Denial of Service Attacks, International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine and Mobile Technologies on the Internet, L. Ming Li, "An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition", Computers & Security, Vol. 23, Issue 7, Elsevier, ISSN , April A. Hussain, J. Heidemann, and C. Papadopoulos. "A Framework for Classifying Denial of Service Attacks". In Proceedings of the ACM SIGCOMM Conference, pp , Karlsruhe, Germany, August L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred, "Statistical Approaches to DDoS Attack Detection and Response", DARPA Information Survivability Conference and Exposition, Shuyuan Jin, Daniel S. Yeung, "A Covariance Analysis Model for DDoS Attack Detection", IEEE Communications Society, K. Mihui, N. Hyunjung, C. Kijoon, B. Hyochan, and N. Jungchan, "A Combined Data Mining Approach for DDoS Attack Detection", Information Networking: Networking Technologies for Broadband and Mobile Networks International Conference (ICOIN 2004), Busan, Korea, February D. Gavrilis, I. Tsoulos, E. Dermatas, "Feature selection for robust detection of distributed Denial-of-Service attacks using genetic algorithm", Methods and Applications of Artificial Intelligence: Third Hellenic Conference on AI (SETN 2004), Samos, Greece, May J. Cannady, "Artificial Neural Networks for Misuse Detection", In Proceedings of National Information Systems Security Conference, B.C. Rhodes, J.A. Mahaffey, and J. D. Cannady, "Multiple Self-Organizing Maps for Intrusion Detection", In Proceedings of 23rd National Information Systems Security Conference, 2000.
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
An Efficient Filter for Denial-of-Service Bandwidth Attacks
An Efficient Filter for Denial-of-Service Bandwidth Attacks Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan and Samer Shami Department of Electrical and Electronic Engineering ARC Special
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS
A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS T. Subbulakshmi 1, P. Parameswaran 2, C. Parthiban 3, M. Mariselvi 4, J.
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Two State Intrusion Detection System Against DDos Attack in Wireless Network
Two State Intrusion Detection System Against DDos Attack in Wireless Network 1 Pintu Vasani, 2 Parikh Dhaval 1 M.E Student, 2 Head of Department (LDCE-CSE) L.D. College of Engineering, Ahmedabad, India.
Methodologies for detecting DoS/DDoS attacks against network servers
Methodologies for detecting DoS/DDoS attacks against network servers Mohammed Alenezi School of Computer Science & Electronic Engineering University of Essex name Colchester, UK [email protected] Martin
A Flow-based Method for Abnormal Network Traffic Detection
A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No., February 8 7 Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms Y.Dhanalakshmi and Dr.I. Ramesh
Signal Processing Methods for Denial of Service Attack Detection
0 Signal Processing Methods for Denial of Service Attack Detection Urbashi Mitra Ming Hsieh Department of Electrical Engineering Viterbi School of Engineering University of Southern California Los Angeles,
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Amit Khajuria 1, Roshan Srivastava 2 1 M. Tech Scholar, Computer Science Engineering, Lovely Professional University,
Network Protection Against DDoS Attacks
Network Protection Against DDoS Attacks Petr Dzurenda, Zdenek Martinasek, Lukas Malina Abstract The paper deals with possibilities of the network protection against Distributed Denial of Service attacks
A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
Intrusion Detection System for Cloud Network Using FC-ANN Algorithm
Intrusion Detection System for Cloud Network Using FC-ANN Algorithm Swati Ramteke 1, Rajesh Dongare 2, Komal Ramteke 3 Student, Department of Information Technology, VIIT, Pune, India 1 Student, Department
Denial of Service and Anomaly Detection
Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece [email protected] SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and
SECURING APACHE : DOS & DDOS ATTACKS - I
SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP
Acta Electrotechnica et Informatica No. 1, Vol. 6, 2006 1 INTRUSION DETECTION SYSTEM USING SELF ORGANIZING MAP Liberios VOKOROKOS, Anton BALÁŽ, Martin CHOVANEC Technical University of Košice, Faculty of
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA
SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Zhiyuan Tan 1,2, Aruna Jamdagni 1,2, Xiangjian He 1, Priyadarsi Nanda 1, and Ren Ping Liu 2 1 Centre for Innovation in IT Services
Early DoS Attack Detection using Smoothened Time-Series and Wavelet Analysis
Third International Symposium on Information Assurance and Security Early DoS Attack Detection using Smoothened Time-Series and Wavelet Analysis Pravin Shinde, Srinivas Guntupalli CDAC, Mumbai {pravin,srinivas}@cdacmumbai.in
Intrusion Forecasting Framework for Early Warning System against Cyber Attack
Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback
Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Network Intrusion Detection Using an Improved Competitive Learning Neural Network
Network Intrusion Detection Using an Improved Competitive Learning Neural Network John Zhong Lei and Ali Ghorbani Faculty of Computer Science University of New Brunswick Fredericton, NB, E3B 5A3, Canada
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Intrusion Detection Using PCA Based Modular Neural Network
International Journal of Machine Learning and Computing, Vol. 2, No. 5, October 2012 Intrusion Detection Using PCA Based Modular Neural Network Khaled Al-Nafjan, Musaed A. Al-Hussein, Abdullah S. Alghamdi,
Performance Comparison between Backpropagation Algorithms Applied to Intrusion Detection in Computer Network Systems
Performance Comparison between Backpropagation Algorithms Applied to Intrusion Detection in Computer Network Systems Iftikhar Ahmad, M.A Ansari, Sajjad Mohsin Department of Computer Sciences, Federal Urdu
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Data Mining for Network Intrusion Detection
Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55 Overview This is important for defense in depth Much
A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS
, pp-29-33 Available online at http://www.bioinfo.in/contents.php?id=55 A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS SHUCHI JUYAL 1 AND RADHIKA PRABHAKAR 2 Department of Computer Application,
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
DDoS Attacks and Defenses Overview
DDoS Attacks and Defenses Overview Pedro Pinto 1 1 ESTG/IPVC Escola Superior de Tecnologia e Gestão, Intituto Politécnico de Viana do Castelo, Av. do Atlântico, 4900-348 Viana do Castelo, Portugal [email protected]
Using Artificial Intelligence in Intrusion Detection Systems
Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology [email protected] Abstract Artificial Intelligence could make the use of Intrusion Detection
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Survey on DDoS Attack Detection and Prevention in Cloud
Survey on DDoS Detection and Prevention in Cloud Patel Ankita Fenil Khatiwala Computer Department, Uka Tarsadia University, Bardoli, Surat, Gujrat Abstract: Cloud is becoming a dominant computing platform
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
An Intelligent Firewall to Detect Novel Attacks
An Intelligent Firewall to Detect Novel Attacks An Integrated Approach based on Anomaly Detection Against Virus Attacks InSeon Yoo and Ulrich Ultes-Nitsche Department of Electronics and Computer Science,
A System for in-network Anomaly Detection
A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily
Adaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
Analyzing TCP Traffic Patterns Using Self Organizing Maps
Analyzing TCP Traffic Patterns Using Self Organizing Maps Stefano Zanero D.E.I.-Politecnico di Milano, via Ponzio 34/5-20133 Milano Italy [email protected] Abstract. The continuous evolution of the
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
Neural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Behaviour Based Worm Detection and Signature Automation
Journal of Computer Science 7 (11): 1724-1728, 2011 ISSN 1549-3636 2011 Science Publications Behaviour Based Worm Detection and Signature Automation 1 Mohammed Anbar, 1 Selvakumar Manickam, 2 Al-Samarraie
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
