scispace - formally typeset
Proceedings ArticleDOI

A system approach to network modeling for DDoS detection using a Naìve Bayesian classifier

TLDR
The approach to a carefully engineered, practically realised system to detect DoS attacks using a Naìve Bayesian(NB) classifier is described, which includes network modeling for two protocols - TCP and UDP.
Abstract
Denial of Service(DoS) attacks pose a big threat to any electronic society. DoS and DDoS attacks are catastrophic particularly when applied to highly sensitive targets like Critical Information Infrastructure. While research literature has focussed on using various fundamental classifier models for detecting attacks, the common trend observed in literature is to classify DoS attacks into the broad class of intrusions, which makes proposed solutions to this class of attacks unrealistic in practical terms. In this work, the approach to a carefully engineered, practically realised system to detect DoS attacks using a Naive Bayesian(NB) classifier is described. The work includes network modeling for two protocols - TCP and UDP.

read more

References
More filters
Journal ArticleDOI

A taxonomy of DDoS attack and DDoS defense mechanisms

TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Proceedings ArticleDOI

Statistical approaches to DDoS attack detection and response

TL;DR: Methods to identify DDoS attacks by computing entropy and frequency-sorted distributions of selected packet attributes and how the detectors can be extended to make effective response decisions are presented.
Proceedings Article

Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.

TL;DR: V WR FOL HQWV PDNLQJ VHUYLFH UHTXHVWV 7R FRPSOHWH LWV UH TXHVW D FOLHQW PXVW VROYH LWV SX]]OH FRUUHFWO\,Q WKLV SDSHU ZH GHVFULEH WKH F OLHQW SX]DWLRQ DQG JLYH D ULJRURXV SURRI
Book ChapterDOI

DOS-Resistant Authentication with Client Puzzles

TL;DR: In this paper, the authors show how stateless authentication protocols and the client puzzles of Juels and Brainard can be used to prevent denial of service by server resource exhaustion in open communications networks.
Related Papers (5)