首页 | 本学科首页   官方微博 | 高级检索  
     


Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
Authors:Sanguk Noh  Gihyun Jung  Kyunghee Choi  Cheolho Lee  
Affiliation:aSchool of Computer Science and Information Engineering, The Catholic University of Korea, Bucheon, Republic of Korea;bDivision of Electronics Engineering, Ajou University, Suwon, Republic of Korea;cGraduate School of Information and Communication, Ajou University, Suwon, Republic of Korea;dNational Security Research Institute, Daejeon, Republic of Korea
Abstract:The ability to dynamically collect and analyze network traffic and to accurately report the current network status is critical in the face of large-scale intrusions, and enables networks to continually function despite of traffic fluctuations. The paper presents a network traffic model that represents a specific network pattern and a methodology that compiles the network traffic into a set of rules using soft computing methods. This methodology based upon the network traffic model can be used to detect large-scale flooding attacks, for example, a distributed denial-of-service (DDoS) attack. We report experimental results that demonstrate the distinctive and predictive patterns of flooding attacks in simulated network settings, and show the potential of soft computing methods for the successful detection of large-scale flooding attacks.
Keywords:Network traffic modeling  Soft computing  Compiled rules  Intrusion detection  Flooding attacks
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号