메뉴 건너뛰기




Volumn 8, Issue 3, 2008, Pages 1200-1210

Compiling network traffic into rules using soft computing methods for the detection of flooding attacks

Author keywords

Compiled rules; Flooding attacks; Intrusion detection; Network traffic modeling; Soft computing

Indexed keywords

FLOOD CONTROL; MATHEMATICAL MODELS; SECURITY OF DATA; SOFT COMPUTING; TELECOMMUNICATION NETWORKS;

EID: 40649126581     PISSN: 15684946     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.asoc.2007.02.016     Document Type: Article
Times cited : (24)

References (31)
  • 1
    • 40649100857 scopus 로고    scopus 로고
    • BindView's RAZOR Security Team, Zombie Zapper, available on-line: http://razor.bindview.com/tools/ZombieZapper_form.shtml, 2001.
    • BindView's RAZOR Security Team, Zombie Zapper, available on-line: http://razor.bindview.com/tools/ZombieZapper_form.shtml, 2001.
  • 2
    • 34249966007 scopus 로고
    • The CN2 induction algorithm
    • Clark P., and Niblett T. The CN2 induction algorithm. Mach. Learn. J. 3 4 (1989) 261-283
    • (1989) Mach. Learn. J. , vol.3 , Issue.4 , pp. 261-283
    • Clark, P.1    Niblett, T.2
  • 3
    • 40649124336 scopus 로고    scopus 로고
    • D. Dittrich, Distributed denial of service (DDoS) Attacks/tools, available on-line: http://staff.washington.edu/dittrich/misc/ddos/, 2006.
    • D. Dittrich, Distributed denial of service (DDoS) Attacks/tools, available on-line: http://staff.washington.edu/dittrich/misc/ddos/, 2006.
  • 4
    • 2442617148 scopus 로고    scopus 로고
    • Extracting rules from trained neural network using GA for managing E-business
    • Elalfi A.E., Haque R., and Elalami M.E. Extracting rules from trained neural network using GA for managing E-business. Appl. Soft Comput. 4 (2004) 65-77
    • (2004) Appl. Soft Comput. , vol.4 , pp. 65-77
    • Elalfi, A.E.1    Haque, R.2    Elalami, M.E.3
  • 5
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the Internet
    • Garber L. Denial-of-service attacks rip the Internet. IEEE Comput. 33 4 (2000) 12-17
    • (2000) IEEE Comput. , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 7
    • 40649117032 scopus 로고    scopus 로고
    • R. Hanson, J. Stutz, P. Cheeseman, Bayesian Classification Theory, Technical Report FIA-90-12-7-01, NASA Ames Research Center, AI Branch, 1991.
    • R. Hanson, J. Stutz, P. Cheeseman, Bayesian Classification Theory, Technical Report FIA-90-12-7-01, NASA Ames Research Center, AI Branch, 1991.
  • 8
    • 40649124620 scopus 로고    scopus 로고
    • L. Holder, ML v2.0: Machine Learning Program Evaluator, available on-line: http://www-cse.uta.edu/∼holder/ftp/ml2.0.tar.gz.
    • L. Holder, ML v2.0: Machine Learning Program Evaluator, available on-line: http://www-cse.uta.edu/∼holder/ftp/ml2.0.tar.gz.
  • 9
    • 40649094376 scopus 로고    scopus 로고
    • K. Houle, G. Weaver, N. Long, R. Thomas, Trends in denial of service attack technology, CERT Coordination Center White Paper, available on-line: http://www.cert.org/archive/pdf/DoS_trends.pdf, 2001.
    • K. Houle, G. Weaver, N. Long, R. Thomas, Trends in denial of service attack technology, CERT Coordination Center White Paper, available on-line: http://www.cert.org/archive/pdf/DoS_trends.pdf, 2001.
  • 10
    • 40649093665 scopus 로고    scopus 로고
    • A. Householder, A. Manion, L. Pesante, G.M. Weaver, Managing the Threat of Denial-of-Service Attacks, CERT Coordination Center White Paper, available on-line: http://www.cert.org/archive/pdf/Managing_DoS.pdf, 2001.
    • A. Householder, A. Manion, L. Pesante, G.M. Weaver, Managing the Threat of Denial-of-Service Attacks, CERT Coordination Center White Paper, available on-line: http://www.cert.org/archive/pdf/Managing_DoS.pdf, 2001.
  • 13
    • 33644647191 scopus 로고    scopus 로고
    • Adaptation and interaction in dynamical systems: modelling and rule discovery through evolving connectionist systems
    • Kasabov N. Adaptation and interaction in dynamical systems: modelling and rule discovery through evolving connectionist systems. Appl. Soft Comput. 6 (2006) 307-322
    • (2006) Appl. Soft Comput. , vol.6 , pp. 307-322
    • Kasabov, N.1
  • 14
    • 40649095349 scopus 로고    scopus 로고
    • A.B. Kulkarni, S.F. Bush, S.C. Evans, Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, Technical Report 2001CRD176, GE Research and Development Center, 2001.
    • A.B. Kulkarni, S.F. Bush, S.C. Evans, Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, Technical Report 2001CRD176, GE Research and Development Center, 2001.
  • 15
    • 40649121599 scopus 로고    scopus 로고
    • Lawrence Berkeley National Laboratory's Network Research Group, libpcap: the Packet Capture library, available on-line: http://ftp.ee.lbl.gov/, 2002.
    • Lawrence Berkeley National Laboratory's Network Research Group, libpcap: the Packet Capture library, available on-line: http://ftp.ee.lbl.gov/, 2002.
  • 16
    • 33744912144 scopus 로고    scopus 로고
    • Characterizing DDoS attacks with traffic rate analysis
    • Lee C., Noh S., Choi K., and Jung G. Characterizing DDoS attacks with traffic rate analysis. Proceedings of e-Society (2003) 81-88
    • (2003) Proceedings of e-Society , pp. 81-88
    • Lee, C.1    Noh, S.2    Choi, K.3    Jung, G.4
  • 18
    • 0029306937 scopus 로고
    • Prevention of congestion in packet-switched multistage interconnection networks
    • Liu J.C., Shin K.G., and Chang C.C. Prevention of congestion in packet-switched multistage interconnection networks. IEEE Trans. Parallel Distrib. Syst. 6 5 (1995) 535-541
    • (1995) IEEE Trans. Parallel Distrib. Syst. , vol.6 , Issue.5 , pp. 535-541
    • Liu, J.C.1    Shin, K.G.2    Chang, C.C.3
  • 20
  • 22
    • 40649092666 scopus 로고    scopus 로고
    • The National Infrastructure Protection Center (NIPC), Potential Distributed Denial of Service (DDoS) Attacks, ADVISORY 01-021, 2001.
    • The National Infrastructure Protection Center (NIPC), Potential Distributed Denial of Service (DDoS) Attacks, ADVISORY 01-021, 2001.
  • 23
    • 0002432012 scopus 로고    scopus 로고
    • Towards flexible multi-agent decision-making under time pressure
    • Noh S., and Gmytrasiewicz P.J. Towards flexible multi-agent decision-making under time pressure. Proceedings of IJCAI (1999) 492-498
    • (1999) Proceedings of IJCAI , pp. 492-498
    • Noh, S.1    Gmytrasiewicz, P.J.2
  • 25
    • 40649117511 scopus 로고    scopus 로고
    • Packet Storm, Tribe Flood Network 2000 (TFN2K) DDoS tool, available on-line: http://packetstormsecurity.org/distributed/TFN2k_Analysis-1.3.txt, 2000.
    • Packet Storm, Tribe Flood Network 2000 (TFN2K) DDoS tool, available on-line: http://packetstormsecurity.org/distributed/TFN2k_Analysis-1.3.txt, 2000.
  • 27
    • 40649100404 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation, SPECweb99 Benchmark, available on-line: http://www.spec.org/osg/web99, 2005.
    • Standard Performance Evaluation Corporation, SPECweb99 Benchmark, available on-line: http://www.spec.org/osg/web99, 2005.
  • 28
    • 40649093162 scopus 로고    scopus 로고
    • TheoryGroup, Remote Intrusion Detector (RID), available on-line: http://www.theorygroup.com/Software/RID, 2001.
    • TheoryGroup, Remote Intrusion Detector (RID), available on-line: http://www.theorygroup.com/Software/RID, 2001.
  • 30
    • 0035402092 scopus 로고    scopus 로고
    • On the defense of the distributed denial of service attacks: an on-off feedback control approach
    • Xiong Y., Liu S., and Sun P. On the defense of the distributed denial of service attacks: an on-off feedback control approach. IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. 31 4 (2001) 282-293
    • (2001) IEEE Trans. Syst. Man Cybern.-Part A: Syst. Hum. , vol.31 , Issue.4 , pp. 282-293
    • Xiong, Y.1    Liu, S.2    Sun, P.3
  • 31
    • 0028385414 scopus 로고
    • Fuzzy logic, neural networks and soft computing
    • Zadeh L.A. Fuzzy logic, neural networks and soft computing. Commun. ACM 37 3 (1994) 77-84
    • (1994) Commun. ACM , vol.37 , Issue.3 , pp. 77-84
    • Zadeh, L.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.