scispace - formally typeset
Journal ArticleDOI

Denial-of-service attack-detection techniques

Reads0
Chats0
TLDR
Although each detector shows promise in limited testing, none completely solve the detection problem and combining various approaches with experienced network operators most likely produce the best results.
Abstract
Denial-of-service (DoS) detection techniques - such as activity profiling, change-point detection, and wavelet-based signal analysis - face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques and testing results provides insight into our ability to successfully identify DoS flooding attacks. Although each detector shows promise in limited testing, none completely solve the detection problem. Combining various approaches with experienced network operators most likely produce the best results.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Cyber Security for Smart Grid Communications

TL;DR: The cyber security requirements and the possible vulnerabilities in smart grid communications are summarized and the current solutions on cyber security for smartgrid communications are surveyed.
Journal ArticleDOI

Eviction of Misbehaving and Faulty Nodes in Vehicular Networks

TL;DR: This paper proposes protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system, and shows that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness.
Journal ArticleDOI

Review: An intrusion detection and prevention system in cloud computing: A systematic review

TL;DR: This paper surveys, explores and informs researchers about the latest developed IDPSs and alarm management techniques by providing a comprehensive taxonomy and investigating possible solutions to detect and prevent intrusions in cloud computing systems.
Journal ArticleDOI

Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics

TL;DR: Two new information metrics such as the generalized entropy metric and the information distance metric are proposed to detect low-rate DDoS attacks by measuring the difference between legitimate traffic and attack traffic.
Journal ArticleDOI

Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach

TL;DR: A game-theoretic framework is formulated and it is proved that the optimal strategies for both sides constitute a Nash equilibrium of a zero-sum game.
References
More filters
Journal ArticleDOI

A taxonomy of DDoS attack and DDoS defense mechanisms

TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Proceedings Article

Inferring internet denial-of-service activity

TL;DR: This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.
Proceedings ArticleDOI

A signal analysis of network traffic anomalies

TL;DR: This paper reports results of signal analysis of four classes of network traffic anomalies: outages, flash crowds, attacks and measurement failures, and shows that wavelet filters are quite effective at exposing the details of both ambient and anomalous traffic.
Journal ArticleDOI

The 1999 DARPA off-line intrusion detection evaluation

TL;DR: This report describes new and known approaches and strategies that were used to make attacks stealthy for the 1999 DARPA Intrusion Detection Evaluation, and includes many examples of stealthy scripts that can be use to implement stealthy procedures.
Related Papers (5)