Filters








8,888 Hits in 8.0 sec

Abnormality metrics to detect and protect against network attacks

Guangzhi Qu, S. Hariri, S. Jangiti, S. Hussain, Seungchan Oh, M. Yousif, S. Fayssal
The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings.  
We have built a test bed to experiment and evaluate the effectiveness of these metrics to detect several well-known network attacks such as MS SQL slammer worm attack, Denial of Service attack, and email  ...  In this paper, we prevent several abnormality metrics that can be used to detect abnormal behaviors and ulso can be used to quanti& the impact of attacks on pervasive system services.  ...  Most of the current research focuses on developing intrusion detection techniques to well-known attacks (signatures) that can be used to protect against such attacks.  ... 
doi:10.1109/perser.2004.1356777 dblp:conf/icps/QuHJHOFY04 fatcat:2qcnlyav5bfupiss7wpxytu3g4

Abnormality Metrics to Detect and Protect against Network Attacks

Guangzhi Qu, S. Hariri, S. Jangiti, S. Hussain, Seungchan Oh, S. Fayssal, M. Yousif
The IEEE/ACS International Conference on Pervasive Services  
We have built a test bed to experiment and evaluate the effectiveness of these metrics to detect several well-known network attacks such as MS SQL slammer worm attack, Denial of Service attack, and email  ...  In this paper, we prevent several abnormality metrics that can be used to detect abnormal behaviors and ulso can be used to quanti& the impact of attacks on pervasive system services.  ...  Most of the current research focuses on developing intrusion detection techniques to well-known attacks (signatures) that can be used to protect against such attacks.  ... 
doi:10.1109/perser.2004.7 fatcat:dftbvmgttbedhagehgi5zj3xau

Quality-of-protection (QoP)-an online monitoring and self-protection mechanism

S. Hariri, Guangzhi Qu, R. Modukuri, Huoping Chen, M. Yousif
2005 IEEE Journal on Selected Areas in Communications  
With increasing faults and attacks on the Internet infrastructure, there is an impending need to provide automatic techniques to detect and mitigate the impact of attacks on network services.  ...  Index Terms-Abnormality distance (AD), network attack, proactive defense, quality-of-protection (QoP).  ...  We focus on the development of abnormality metrics to quantify the behavior of network systems that can be used to detect abnormal operations caused by network attacks.  ... 
doi:10.1109/jsac.2005.854122 fatcat:2vbj5f3jr5fulmgrk2ut2pwque

An Adaptive Protection of Flooding Attacks Model for Complex Network Environments

Bashar Ahmad Khalaf, Salama A. Mostafa, Aida Mustapha, Mazin Abed Mohammed, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak, Mohamed Elhoseny, Adam Marks
2021 Security and Communication Networks  
In this paper, an adaptive agent-based model, known as an Adaptive Protection of Flooding Attacks (APFA) model, is proposed to protect the Network Application Layer (NAL) against DDoS flooding attacks  ...  service and usually misleads the detection of the DDoS attacks.  ...  Acknowledgments e authors would like to thank the Center of Intelligent and Autonomous Systems (CIAS), Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia (UTHM)  ... 
doi:10.1155/2021/5542919 doaj:a8999f6a9eda4b5bb902e9058bf29398 fatcat:n4uia5vulfhonpfdh3vp5hnsuu

Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies

Hongli Luo, Mei-Ling Shyu
2007 Multimedia and Expo, 2007 IEEE International Conference on  
In this paper, we present a differentiated service protection framework consisting of anomaly traffic detection and resource management.  ...  However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume network bandwidth, thus degrading the quality of the delivered multimedia service.  ...  Quality-of-Protection routing is proposed in [8] to protect against network attacks and reduce the impact of the attacking traffic.  ... 
doi:10.1109/icme.2007.4284956 dblp:conf/icmcs/LuoS07 fatcat:yypmhuz4fne5rktfht5pekiohe

Defense against Bandwidth Attacks with Traffic Resource Management

Hongli Luo, Mei-Ling Shyu
2007 2007 IEEE International Conference on Information Reuse and Integration  
Incoming traffic to the server is monitored and features are extracted for each connection. Anomaly detection technique is used to detect the abnormal traffic.  ...  A DoS attack generates a large volume of traffic to consume the network bandwidth and degrade the service that legitimate users can obtain.  ...  Interaction with Resource Management Protect against Possible Attacks When abnormal traffic is detected by an IDS, some actions need to be taken automatically for the sake of security and resource management  ... 
doi:10.1109/iri.2007.4296619 dblp:conf/iri/LuoS07 fatcat:braa24zqyve33bgw36f75xjuvq

A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data

Sohrab Mokhtari, Alireza Abbaspour, Kang K. Yen, Arman Sargolzaei
2021 Electronics  
Attack detection problems in industrial control systems (ICSs) are commonly known as a network traffic monitoring scheme for detecting abnormal activities.  ...  The proposed approach is called measurement intrusion detection system (MIDS), which enables the system to detect any abnormal activity in the system even if the attacker tries to conceal it in the system's  ...  The NIDS is widely employed to detect any kind of abnormal activity in the system's network flow to defeat these types of attacks.  ... 
doi:10.3390/electronics10040407 fatcat:a4lwfxszdjhdpk3tcpoqgcibi4

Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application

Sofiane Lagraa, Maxime Cailac, Sean Rivera, Frederic Beck, Radu State
2019 2019 Third IEEE International Conference on Robotic Computing (IRC)  
Furthermore, we propose an intrusion detection system to detect abnormal flows. Our defense approach is based on images comparisons and unsupervised anomaly detection method.  ...  We points out a relevant number of security flaws that can be used to take over the flows incoming from the robot cameras.  ...  Our goal is to protect the processing node against attacks by detecting them. III.  ... 
doi:10.1109/irc.2019.00023 dblp:conf/irc/LagraaCRBS19 fatcat:cki55yk6u5eaxm5eb3aroow42u

SGS: Safe-Guard Scheme for Protecting Control Plane Against DDoS Attacks in Software-Defined Networking

Yang Wang, Tao Hu, Guangming Tang, Jichao Xie, Jie Lu
2019 IEEE Access  
This paper proposes a safe-guard scheme (SGS) for protecting control plane against DDoS attacks, and the main characteristic of SGS is deploying multicontroller in control plane through the controller's  ...  The simulation results demonstrate the efficiency of our proposed SGS with real-time DDoS attack defense and high detection accuracy, as well as high-efficiency network resource utilization.  ...  plane, for protecting the control plane against DDoS attacks. • We introduce a flow monitoring approach in anomaly traffic detection module.  ... 
doi:10.1109/access.2019.2895092 fatcat:blmevtqapvckdakasm7zrhwdim

Experiments With Simulation Of Botnets And Defense Agent Teams

Igor Kotenko
2013 ECMS 2013 Proceedings edited by: Webjorn Rekdalsbakken, Robin T. Bye, Houxiang Zhang  
Botnets allow malefactors manage millions of infected computers simultaneously and provide large-scale successful attacks.  ...  The paper suggests an approach for multi-agent simulation of botnets and botnet protection mechanisms.  ...  Technologies of the Russian Academy of Sciences (contract #2.2), State contract #11.519.11.4008 and the EU as part of the SecFutur and MASSIF projects.  ... 
doi:10.7148/2013-0061 dblp:conf/ecms/Kotenko13 fatcat:pdfia24qwbdzzkejlwohm5k7g4

Attack Containment Framework for Large-Scale Critical Infrastructures

Hoang Nguyen, Klara Nahrstedt
2007 2007 16th International Conference on Computer Communications and Networks  
The simulation results show that our containment framework can detect, mitigate and contain large-scale attacks quickly.  ...  We present an attack containment framework against value-changing attacks in large-scale critical infrastructures, based on early warning and cooperative response approaches.  ...  Therefore, protecting CIs against cyber-attacks becomes a very important problem [2] .  ... 
doi:10.1109/icccn.2007.4317859 dblp:conf/icccn/NguyenN07 fatcat:43fhzscgb5cjbfhkqvajef5imq

Machine Learning for Securing SDN based 5G Network

Hassan A. Alamri, Vijey Thayananthan, Javad Yazdani
2021 International Journal of Computer Applications  
Throughout this research, ML and detection technique of DDoS is considered to improve the security solutions of SDN based 5G networks.  ...  When malicious users send DDoS attacks, the SDN based 5G networks face security problems and challenges.  ...  A Safe-guard scheme (SGS) for protecting the control plane against DDoS attacks in software-defined networking not only improves the security solutions but also enhances the overall protections [29] .  ... 
doi:10.5120/ijca2021921027 fatcat:nhie4s6qdrc2bf4shq6lypnkqe

Armor PLC: A Platform for Cyber Security Threats Assessments for PLCs

Wenhui Zhang, Yizheng Jiao, Dazhong Wu, Srivatsa Srinivasa, Asmit De, Swaroop Ghosh, Peng Liu
2019 Procedia Manufacturing  
We describe threat models, detection and protection techniques. We consider vulnerabilities as compromised PLC logic, which is introduced by over-the-network malicious data injection.  ...  We describe threat models, detection and protection techniques. We consider vulnerabilities as compromised PLC logic, which is introduced by over-the-network malicious data injection.  ...  We present new attack models and detection techniques. We also propose a novel protective countermeasure to protect against PLC attacks.  ... 
doi:10.1016/j.promfg.2020.01.334 fatcat:vf5traocinerjanh2i5cshom4a

ColShield: an effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks

I Diana Jeba Jingle, Elijah Blessing Rajsingh
2014 Human-Centric Computing and Information Sciences  
ColShield consists of Intrusion Protection and Detection Systems (IPDS) located at various points in the network which collaboratively defend flooding attacks.  ...  In this paper we propose ColShield, an effective and collaborative protection shield which not only detects flooding attacks but also prevents the flooding attacks through clever spoof detection.  ...  Acknowledgement We would like to thank the reviewers for their valuable comments.  ... 
doi:10.1186/s13673-014-0008-8 fatcat:6ktxtzg3kbdrvkqrob7zi5hiym

Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

Khattab Ali Alheeti, Anna Gruebler, Klaus McDonald-Maier
2016 Computers  
This work presents an intelligent Intrusion Detection System (IDS) that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks.  ...  abnormal conditions.  ...  Klaus McDonald-Maier had the essential and distinct role in writing and designing and simulating the system throughout his continuous feedback and scientific guidance and advice.  ... 
doi:10.3390/computers5030016 fatcat:oy3st43onfb5nompjsv3hsro5q
« Previous Showing results 1 — 15 out of 8,888 results