کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
496083 862849 2008 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نرم افزارهای علوم کامپیوتر
پیش نمایش صفحه اول مقاله
Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
چکیده انگلیسی

The ability to dynamically collect and analyze network traffic and to accurately report the current network status is critical in the face of large-scale intrusions, and enables networks to continually function despite of traffic fluctuations. The paper presents a network traffic model that represents a specific network pattern and a methodology that compiles the network traffic into a set of rules using soft computing methods. This methodology based upon the network traffic model can be used to detect large-scale flooding attacks, for example, a distributed denial-of-service (DDoS) attack. We report experimental results that demonstrate the distinctive and predictive patterns of flooding attacks in simulated network settings, and show the potential of soft computing methods for the successful detection of large-scale flooding attacks.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Applied Soft Computing - Volume 8, Issue 3, June 2008, Pages 1200–1210
نویسندگان
, , , ,