Journal ArticleDOI
Denial-of-service attack-detection techniques
Reads0
Chats0
TLDR
Although each detector shows promise in limited testing, none completely solve the detection problem and combining various approaches with experienced network operators most likely produce the best results.Abstract:
Denial-of-service (DoS) detection techniques - such as activity profiling, change-point detection, and wavelet-based signal analysis - face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques and testing results provides insight into our ability to successfully identify DoS flooding attacks. Although each detector shows promise in limited testing, none completely solve the detection problem. Combining various approaches with experienced network operators most likely produce the best results.read more
Citations
More filters
Journal ArticleDOI
A Survey on Cyber Security for Smart Grid Communications
TL;DR: The cyber security requirements and the possible vulnerabilities in smart grid communications are summarized and the current solutions on cyber security for smartgrid communications are surveyed.
Journal ArticleDOI
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
TL;DR: This paper proposes protocols, as components of a framework, for the identification and local containment of misbehaving or faulty nodes, and then for their eviction from the system, and shows that the distributed approach to contain nodes and contribute to their eviction is efficiently feasible and achieves a sufficient level of robustness.
Journal ArticleDOI
Review: An intrusion detection and prevention system in cloud computing: A systematic review
TL;DR: This paper surveys, explores and informs researchers about the latest developed IDPSs and alarm management techniques by providing a comprehensive taxonomy and investigating possible solutions to detect and prevent intrusions in cloud computing systems.
Journal ArticleDOI
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
Yang Xiang,Ke Li,Wanlei Zhou +2 more
TL;DR: Two new information metrics such as the generalized entropy metric and the information distance metric are proposed to detect low-rate DDoS attacks by measuring the difference between legitimate traffic and attack traffic.
Journal ArticleDOI
Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
TL;DR: A game-theoretic framework is formulated and it is proved that the optimal strategies for both sides constitute a Nash equilibrium of a zero-sum game.
References
More filters
Journal ArticleDOI
A taxonomy of DDoS attack and DDoS defense mechanisms
Jelena Mirkovic,Peter Reiher +1 more
TL;DR: This paper presents two taxonomies for classifying attacks and defenses in distributed denial-of-service (DDoS) and provides researchers with a better understanding of the problem and the current solution space.
Proceedings Article
Inferring internet denial-of-service activity
TL;DR: This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.
Proceedings ArticleDOI
A signal analysis of network traffic anomalies
TL;DR: This paper reports results of signal analysis of four classes of network traffic anomalies: outages, flash crowds, attacks and measurement failures, and shows that wavelet filters are quite effective at exposing the details of both ambient and anomalous traffic.
Journal ArticleDOI
The 1999 DARPA off-line intrusion detection evaluation
TL;DR: This report describes new and known approaches and strategies that were used to make attacks stealthy for the 1999 DARPA Intrusion Detection Evaluation, and includes many examples of stealthy scripts that can be use to implement stealthy procedures.