A flow-based method for abnormal network traffic detection
MS Kim, HJ Kong, SC Hong… - 2004 IEEE/IFIP …, 2004 - ieeexplore.ieee.org
One recent trend in network security attacks is an increasing number of indirect attacks
which influence network traffic negatively, instead of directly entering a system and …
which influence network traffic negatively, instead of directly entering a system and …
Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
CY Ho, YC Lai, IW Chen, FY Wang… - IEEE Communications …, 2012 - ieeexplore.ieee.org
False positives and false negatives happen to every intrusion detection and intrusion
prevention system. This work proposes a mechanism for false positive/negative assessment …
prevention system. This work proposes a mechanism for false positive/negative assessment …
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
M Li - Computers & security, 2006 - Elsevier
Distributed denial-of-service (DDOS) flood attacks remain great threats to the Internet though
various approaches and systems have been proposed. Because arrival traffic pattern under …
various approaches and systems have been proposed. Because arrival traffic pattern under …
Accurately measuring denial of service in simulation and testbed experiments
Researchers in the denial-of-service (DoS) field lack accurate, quantitative, and versatile
metrics to measure service denial in simulation and testbed experiments. Without such …
metrics to measure service denial in simulation and testbed experiments. Without such …
Characteristic analysis of internet traffic from the perspective of flows
The necessity of network traffic monitoring and analysis is growing dramatically with
increasing network usage demands from individual users as well as business communities …
increasing network usage demands from individual users as well as business communities …
Evaluation of TFTP DDoS amplification attack
Web threats are becoming a major issue for both governments and companies. Generally,
web threats increased as much as 600% during last year (WebSense, 2013). This appears …
web threats increased as much as 600% during last year (WebSense, 2013). This appears …
Towards user-centric metrics for denial-of-service measurement
To date, the measurement of user-perceived degradation of quality of service during denial
of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on lower …
of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on lower …
Filtering of shrew DDoS attacks in frequency domain
The shrew distributed denial of service (DDoS) attacks are periodic, bursty, and stealthy in
nature. They are also known as reduction of quality (RoQ) attacks. Such attacks could be …
nature. They are also known as reduction of quality (RoQ) attacks. Such attacks could be …
Routing control method, apparatus and system
M Katoh, T Kato, H Yamada - US Patent 7,746,789, 2010 - Google Patents
This invention is to enable appropriate routing based on transition prediction of network
traffic. This routing control method includes: reading out predicted utilization transition data …
traffic. This routing control method includes: reading out predicted utilization transition data …
[PDF][PDF] Collaborative defense against periodic shrew DDoS attacks in frequency domain
The shrew or pulsing DDoS (Distributed Denial-of-Service) attacks, also known as RoQ
(Reduction of Quality) attacks, are stealthy, periodic, and low-rate in volume. The shrew …
(Reduction of Quality) attacks, are stealthy, periodic, and low-rate in volume. The shrew …