메뉴 건너뛰기




Volumn 50, Issue 6, 2007, Pages 717-727

A denial of service detector based on maximum likelihood detection and the random neural network

Author keywords

Denial of service; Intrusion detection; Maximum likelihood detection criterion; Network security; Random neural networks

Indexed keywords

DETECTORS; MAXIMUM LIKELIHOOD ESTIMATION; NETWORK SECURITY; NEURAL NETWORKS; STATISTICS; TELECOMMUNICATION TRAFFIC;

EID: 35648969617     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxm066     Document Type: Article
Times cited : (44)

References (33)
  • 2
    • 50249166335 scopus 로고    scopus 로고
    • BBC, September
    • BBC, September 2001: Teenager cleared of hacking. http://news.bbc.co.uk/ l/hi/england/hampshire/dorset/3197446.stm.
    • (2001) Teenager cleared of hacking
  • 3
    • 35648973240 scopus 로고    scopus 로고
    • WiredNews: Pentagon Hacker Exposed by Just. Dpt. http://www.wired.com/ news/technology/0,1282,11030,00.html.
    • WiredNews: Pentagon Hacker Exposed by Just. Dpt. http://www.wired.com/ news/technology/0,1282,11030,00.html.
  • 4
    • 24644453625 scopus 로고    scopus 로고
    • Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks
    • Jalili, R., Imani-Mehr, F., Amini, M. and Shahriari, H.R. (2005) Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. Lecture Notes in Computer Science, vol. 3439, pp. 192-203.
    • (2005) Lecture Notes in Computer Science , vol.3439 , pp. 192-203
    • Jalili, R.1    Imani-Mehr, F.2    Amini, M.3    Shahriari, H.R.4
  • 5
    • 33745922681 scopus 로고    scopus 로고
    • A Combined Data Mining Approach for DDoS Attack Detection
    • Kim, M., Na, H., Chae, K., Bang, H. and Na, J (2004) A Combined Data Mining Approach for DDoS Attack Detection. Lecture Notes in Computer Science, vol. 3090, pp. 943-950.
    • (2004) Lecture Notes in Computer Science , vol.3090 , pp. 943-950
    • Kim, M.1    Na, H.2    Chae, K.3    Bang, H.4    Na, J.5
  • 6
    • 16644393989 scopus 로고    scopus 로고
    • Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
    • Gavrilis, D. and Dermatas, E. (2005) Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Comput. Netw., 48, 235-245.
    • (2005) Comput. Netw , vol.48 , pp. 235-245
    • Gavrilis, D.1    Dermatas, E.2
  • 7
    • 27144490740 scopus 로고    scopus 로고
    • Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches
    • He, H.T., Luo, X.N. and Liu, B.L. (2005) Detecting Anomalous Network Traffic with Combined Fuzzy-Based Approaches. Lecture Notes in Computer Science, vol. 3645, pp. 433-442.
    • (2005) Lecture Notes in Computer Science , vol.3645 , pp. 433-442
    • He, H.T.1    Luo, X.N.2    Liu, B.L.3
  • 8
    • 33746639174 scopus 로고    scopus 로고
    • Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks
    • Wei, W., Dong, Y., Lu, D. and Jin, G. (2006) Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks. Lecture Notes in Computer Science, vol. 3994, pp. 57-64.
    • (2006) Lecture Notes in Computer Science , vol.3994 , pp. 57-64
    • Wei, W.1    Dong, Y.2    Lu, D.3    Jin, G.4
  • 9
    • 9444289934 scopus 로고    scopus 로고
    • Computational Intelligent Techniques for Detecting Denial of Service Attacks
    • Mukkamala, S. and Sung, A.H. (2004) Computational Intelligent Techniques for Detecting Denial of Service Attacks. Lecture Notes in Artificial Intelligence, vol. 3029, pp. 616-624.
    • (2004) Lecture Notes in Artificial Intelligence , vol.3029 , pp. 616-624
    • Mukkamala, S.1    Sung, A.H.2
  • 10
    • 33947265693 scopus 로고    scopus 로고
    • The Feature Selection and Intrusion Detection Problems
    • Sung, A.H. and Mukkamala, S. (2004) The Feature Selection and Intrusion Detection Problems. Lecture Notes in Computer Science, vol. 3321, pp. 468-482.
    • (2004) Lecture Notes in Computer Science , vol.3321 , pp. 468-482
    • Sung, A.H.1    Mukkamala, S.2
  • 11
    • 33646900187 scopus 로고    scopus 로고
    • Change trend of averaged burst parameter of traffic under DDOS flood attacks
    • Li, M. (2006) Change trend of averaged burst parameter of traffic under DDOS flood attacks. Comput. Secur., 25, 213-220.
    • (2006) Comput. Secur , vol.25 , pp. 213-220
    • Li, M.1
  • 13
    • 8344244591 scopus 로고    scopus 로고
    • An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
    • Li, M. (2004) An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. Comput. Secur., 23, 549-558.
    • (2004) Comput. Secur , vol.23 , pp. 549-558
    • Li, M.1
  • 15
    • 0013347997 scopus 로고    scopus 로고
    • Detecting distributed denial-of-service attacks using kolmogorov complexity metrics
    • General Electric Company
    • Kulkarni, A.B., Bush, S.F. and Evans, S. (2002) Detecting distributed denial-of-service attacks using kolmogorov complexity metrics. Technical Information Series 2001CRD176. General Electric Company.
    • (2002) Technical Information Series 2001CRD176
    • Kulkarni, A.B.1    Bush, S.F.2    Evans, S.3
  • 16
    • 33744908603 scopus 로고    scopus 로고
    • Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation
    • Furuya, T., Matsuzaki, T. and Matsuura, K. (2005) Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. Lecture Notes in Computer Science, vol. 3822, pp. 395-406.
    • (2005) Lecture Notes in Computer Science , vol.3822 , pp. 395-406
    • Furuya, T.1    Matsuzaki, T.2    Matsuura, K.3
  • 17
    • 35048886720 scopus 로고    scopus 로고
    • A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform
    • Yang, X., Liu, Y., Zeng, M. and Shi, Y. (2004) A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform. Lecture Notes in Computer Science, vol. 3309, pp. 173-181.
    • (2004) Lecture Notes in Computer Science , vol.3309 , pp. 173-181
    • Yang, X.1    Liu, Y.2    Zeng, M.3    Shi, Y.4
  • 18
    • 17444397467 scopus 로고    scopus 로고
    • DDoS attack detection and wavelets
    • Li, L. and Lee, G. (2005) DDoS attack detection and wavelets. Telecommun. Syst., 28, 435-451.
    • (2005) Telecommun. Syst , vol.28 , pp. 435-451
    • Li, L.1    Lee, G.2
  • 19
    • 35048886560 scopus 로고    scopus 로고
    • Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
    • Noh, S., Lee, C., Choi, K. and Jung, G. (2003) Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning. Lecture Notes in Computer Science, vol. 2690, pp. 286-295.
    • (2003) Lecture Notes in Computer Science , vol.2690 , pp. 286-295
    • Noh, S.1    Lee, C.2    Choi, K.3    Jung, G.4
  • 20
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • Chen, Y. and Hwang, K. (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Parallel Distrib. Comput. 66, 1137-1151.
    • (2006) Parallel Distrib. Comput , vol.66 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 21
    • 0000428263 scopus 로고
    • Learning in the recurrent random neural network
    • Gelenbe, E. (1993) Learning in the recurrent random neural network. Neural Comput., 5, 154-164.
    • (1993) Neural Comput , vol.5 , pp. 154-164
    • Gelenbe, E.1
  • 22
    • 21244434788 scopus 로고    scopus 로고
    • Self-aware networks and QoS
    • Gelenbe, E., Lent, R. and Nunez, A. (2004) Self-aware networks and QoS. Proc. IEEE, 92, 1478-1489.
    • (2004) Proc. IEEE , vol.92 , pp. 1478-1489
    • Gelenbe, E.1    Lent, R.2    Nunez, A.3
  • 25
    • 1642617444 scopus 로고    scopus 로고
    • The Hurst exponent over time:tEsting the assertion that emerging markets are becoming more efficient
    • Cajueiro, D.O. and Tabak, B.M. (2004) The Hurst exponent over time:tEsting the assertion that emerging markets are becoming more efficient. Physica A, 336, 521-537.
    • (2004) Physica A , vol.336 , pp. 521-537
    • Cajueiro, D.O.1    Tabak, B.M.2
  • 26
    • 0030270532 scopus 로고    scopus 로고
    • Low bit-rate video compression with neural networks and temporal subsampling
    • Cramer, C., Gelenbe, E. and Bakircioglu, H. (1996) Low bit-rate video compression with neural networks and temporal subsampling. Proc. IEEE 84, 1529-1543.
    • (1996) Proc. IEEE , vol.84 , pp. 1529-1543
    • Cramer, C.1    Gelenbe, E.2    Bakircioglu, H.3
  • 27
    • 33746488814 scopus 로고    scopus 로고
    • Texture classification and retrieval using the random neural network model
    • Teke, A. and Atalay, V. (2006) Texture classification and retrieval using the random neural network model. Comput. Manage. Sci., 3 193-205.
    • (2006) Comput. Manage. Sci , vol.3 , pp. 193-205
    • Teke, A.1    Atalay, V.2
  • 30
    • 84871013073 scopus 로고    scopus 로고
    • UCLA CSD packet traces. http://www.lasr.cs.ucla.edu/ddos/traces/public/ usc/.
    • UCLA CSD packet traces
  • 33
    • 33846199593 scopus 로고    scopus 로고
    • Self-aware approach to denial of service defence
    • Gelenbe, E. and Loukas, G. (2007) Self-aware approach to denial of service defence. Comput. Netw., 51, 1299-1314.
    • (2007) Comput. Netw , vol.51 , pp. 1299-1314
    • Gelenbe, E.1    Loukas, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.