메뉴 건너뛰기




Volumn 34, Issue 4, 2010, Pages 497-507

Enhancing DDoS flood attack detection via intelligent fuzzy logic

Author keywords

Fuzzy logic; Network security; Self similarity; Statistical detection

Indexed keywords

ATTACK DETECTION; CHANGE-POINTS; DISTRIBUTED DENIAL OF SERVICE; HURST PARAMETER; INFORMATION CRITERION; NETWORK BANDWIDTH; NETWORK EQUIPMENT; NETWORK TRAFFIC; SCHWARZ; SELF-SIMILARITIES; STATISTICAL ANALYSIS; STATISTICAL DETECTION; TEST RESULTS; TWO STAGE;

EID: 78650122734     PISSN: 03505596     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (24)

References (32)
  • 1
    • 78650141756 scopus 로고    scopus 로고
    • http://www.cert.org.
  • 2
    • 8344244591 scopus 로고    scopus 로고
    • An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
    • M. Li. An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition. Computers & Security, 23(7): 549-558, 2004.
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 549-558
    • Li, M.1
  • 4
    • 0029323403 scopus 로고
    • Wide area traffic: The failure of Poisson modeling
    • V. Paxson and S. Floyd. Wide area traffic: the failure of Poisson modeling. IEEE/ACM Transactions on Networking, 3(3): 226-244, 1995.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 6
    • 34548609404 scopus 로고    scopus 로고
    • Network traffic analysis using singular value decomposition and multiscale transforms
    • C.S. Sastry, S. Rawat and A.K. Pujari. Network traffic analysis using singular value decomposition and multiscale transforms. Information Sciences, 177(23): 5275-5291, 2007.
    • (2007) Information Sciences , vol.177 , Issue.23 , pp. 5275-5291
    • Sastry, C.S.1    Rawat, S.2    Pujari, A.K.3
  • 8
    • 24144485773 scopus 로고    scopus 로고
    • On-line segmentation of non-stationary fractal network traffic with wavelet transforms and Log-likelihood-based statistics
    • D. Rincón and S. Sallent. On-line segmentation of non-stationary fractal network traffic with wavelet transforms and Log-likelihood-based statistics. LNCS, 3375: 110-123, 2005.
    • (2005) LNCS , vol.3375 , pp. 110-123
    • Rincón, D.1    Sallent, S.2
  • 9
    • 33751076582 scopus 로고    scopus 로고
    • A survey of application of fuzzy logic in intelligent transportation systems (ITS) and rural ITS
    • March
    • N. K. Swain. A survey of application of fuzzy logic in intelligent transportation systems (ITS) and rural ITS. In Proceedings of the IEEE Southeast Conference, March 2006.
    • (2006) Proceedings of the IEEE Southeast Conference
    • Swain, N.K.1
  • 10
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • S.X. Wu and W. Banzhaf. The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing, 10: 1-35, 2010.
    • (2010) Applied Soft Computing , vol.10 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 12
    • 84902156141 scopus 로고    scopus 로고
    • Neuro-fuzzy systems: State-of-the-art modeling techniques, connectionist models of neurons, learning processes, and artificial intelligence
    • A. Abraham. Neuro-fuzzy systems: State-of-the-art modeling techniques, connectionist models of neurons, learning processes, and artificial intelligence. LNCS, 2084: 269-276, 2001.
    • (2001) LNCS , vol.2084 , pp. 269-276
    • Abraham, A.1
  • 13
    • 34547549173 scopus 로고    scopus 로고
    • A fuzzy classification model for online customers
    • A. Meier and N. Werro. A fuzzy classification model for online customers. Informatica, 31(2): 175-182, 2007.
    • (2007) Informatica , vol.31 , Issue.2 , pp. 175-182
    • Meier, A.1    Werro, N.2
  • 14
    • 23844513842 scopus 로고    scopus 로고
    • Computational intelligence in data mining
    • J. Abonyi and B. Feil. Computational intelligence in data mining. Informatica, 29(1): 3-12, 2005.
    • (2005) Informatica , vol.29 , Issue.1 , pp. 3-12
    • Abonyi, J.1    Feil, B.2
  • 15
    • 0036563760 scopus 로고    scopus 로고
    • Some approaches to information security of communication networks
    • S. Avdoshin and V. Serdiouk. Some approaches to information security of communication networks. Informatica, 26(1): 1-10, 2002.
    • (2002) Informatica , vol.26 , Issue.1 , pp. 1-10
    • Avdoshin, S.1    Serdiouk, V.2
  • 16
    • 1242321281 scopus 로고    scopus 로고
    • DDoS attacks and defense mechanisms: Classification and stateof- the-art
    • C. Douligeris and A. Mitrokotsa. DDoS attacks and defense mechanisms: classification and stateof- the-art. Computer Networks, 44(5): 643-666, 2004.
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 17
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha and J. M. Park. An overview of anomaly detection techniques: existing solutions and latest technological trends. Computer Networks, 51(12): 3448-3470, 2007.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 18
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • P. García-Teodoro, J. Díaz-Verdejo and G. Maciá- Fernández. Anomaly-based network intrusion detection: techniques, systems and challenges. Computers & Security, 28(1-2): 18-28, 2009.
    • (2009) Computers & Security , vol.28 , Issue.1-2 , pp. 18-28
    • García-Teodoro, P.1    Díaz-Verdejo, J.2    MacIá- Fernández, G.3
  • 19
    • 17644372344 scopus 로고    scopus 로고
    • Self-similarity and long range dependence on the internet: A second look at the evidence, origins and implications
    • W.B. Gong, Y. Liu and V. Misra. Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications. Computer Networks, 48(3): 377-399, 2005.
    • (2005) Computer Networks , vol.48 , Issue.3 , pp. 377-399
    • Gong, W.B.1    Liu, Y.2    Misra, V.3
  • 20
    • 33646900187 scopus 로고    scopus 로고
    • Change trend of averaged Hurst parameter traffic under DDOS flood attacks
    • M. Li. Change trend of averaged Hurst parameter traffic under DDOS flood attacks. Computers & Security, 25(3): 213-220, 2006.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 213-220
    • Li, M.1
  • 21
    • 2442583303 scopus 로고    scopus 로고
    • The LoSS technique for detecting new denial of service attacks
    • Greensboro, NC, March
    • W.H. Allen and G.A. Marin. The LoSS technique for detecting new denial of service attacks. In Proceedings of IEEE South East Conference, Greensboro, NC, March 2004.
    • (2004) Proceedings of IEEE South East Conference
    • Allen, W.H.1    Marin, G.A.2
  • 22
    • 0035246057 scopus 로고    scopus 로고
    • Online error detection through observation of traffic selfsimilarity
    • W. Schleifer and M. Männle. Online error detection through observation of traffic selfsimilarity. In Proceedings of the IEE Communications Conference, 148(1): 38-42, 2001.
    • (2001) Proceedings of the IEE Communications Conference , vol.148 , Issue.1 , pp. 38-42
    • Schleifer, W.1    Männle, M.2
  • 24
    • 48249144409 scopus 로고    scopus 로고
    • An intelligent method for real-time detection of DDoS attack based on fuzzy logic
    • J.T. Wang and G. Yang. An intelligent method for real-time detection of DDoS attack based on fuzzy logic. Journal of Electronics (China), 25(4): 511-518, 2008.
    • (2008) Journal of Electronics (China) , vol.25 , Issue.4 , pp. 511-518
    • Wang, J.T.1    Yang, G.2
  • 25
    • 17644410745 scopus 로고    scopus 로고
    • On the wavelet spectrum diagnostic for Hurst parameter estimation in the analysis of Internet traffic
    • S. Stoev, M. Taqqu and C. Park. On the wavelet spectrum diagnostic for Hurst parameter estimation in the analysis of Internet traffic. Computer Networks, 48(3): 423-445, 2005.
    • (2005) Computer Networks , vol.48 , Issue.3 , pp. 423-445
    • Stoev, S.1    Taqqu, M.2    Park, C.3
  • 26
    • 8444239367 scopus 로고    scopus 로고
    • Some results on the selfsimilarity property in communication networks
    • S. Song and K. Joseph. Some results on the selfsimilarity property in communication networks. IEEE Transactions on Communications, 52(10): 1636-1641, 2004.
    • (2004) IEEE Transactions on Communications , vol.52 , Issue.10 , pp. 1636-1641
    • Song, S.1    Joseph, K.2
  • 27
    • 0003203686 scopus 로고
    • Statistics for long-memory processes
    • New York
    • J. Beran. Statistics for long-memory processes. Chapman & Hall, New York, 1994.
    • (1994) Chapman & Hall
    • Beran, J.1
  • 28
    • 0031515592 scopus 로고    scopus 로고
    • Testing and locating variance change points with application to stock prices
    • J. Chen and A. Gupta. Testing and Locating Variance Change points with Application to Stock Prices. Journal of the American Statistical Association, 92: 739-747, 1997.
    • (1997) Journal of the American Statistical Association , vol.92 , pp. 739-747
    • Chen, J.1    Gupta, A.2
  • 29
    • 0036349135 scopus 로고    scopus 로고
    • A unified framework for understanding network traffic using independent wavelet models
    • June
    • X. Tian, J. Wu and C. Ji. A unified framework for understanding network traffic using independent wavelet models. In Proceedings of IEEE INFOCOM', June 2002.
    • (2002) Proceedings of IEEE INFOCOM'
    • Tian, X.1    Wu, J.2    Ji, C.3
  • 30
    • 0000501589 scopus 로고
    • Fractional Brownian motions fractional noises and applications
    • B. B. Mandelbrot and J. W. Van Ness. Fractional Brownian motions, fractional noises and applications. SIAM Review, 10(4): 422-437, 1968.
    • (1968) SIAM Review , vol.10 , Issue.4 , pp. 422-437
    • Mandelbrot, B.B.1    Van Ness, J.W.2
  • 32
    • 78650128578 scopus 로고    scopus 로고
    • http://www.cubinlab.ee.unimelb.edu.au/%7Edarryl


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.