tailieunhanh - Báo cáo hóa học: " Research Article Dynamic Modeling of Internet Traffic for Intrusion Detection"

Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Dynamic Modeling of Internet Traffic for Intrusion Detection | Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2007 Article ID 90312 14 pages doi 2007 90312 Research Article Dynamic Modeling of Internet Traffic for Intrusion Detection Khushboo Shah 1 Edmond Jonckheere 2 and Stephan Bohacek3 1 Nevis Networks Inc. Mountain View CA 94043 USA 2 Department of Electrical Engineering University of Southern California Los Angeles CA 90089 USA 3 Department of Electrical and Computer Engineering University of Delaware Newark DE 19711 USA Received 27 May 2005 Revised 15 February 2006 Accepted 18 May 2006 Recommended by Frank Ehlers Computer network traffic is analyzed via mutual information techniques implemented using linear and nonlinear canonical correlation analyses with the specific objective of detecting UDP flooding attacks. NS simulation of HTTP FTP and CBR traffic shows that flooding attacks are accompanied by a change of mutual information either at the link being flooded or at another upstream or downstream link. This observation appears to be topology independent as the technique is demonstrated on the so-called parking-lot topology random 50-node topology and 100-node transit-stub topology. This technique is also employed to detect UDP flooding with low false alarm rate on a backbone link. These results indicate that a change in mutual information provides a useful detection criterion when no other signature of the attack is available. Copyright 2007 Khushboo Shah et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. 1. INTRODUCTION Attacks on the network have become commonplace and with them intrusion detection systems IDSs firewalls virus scanning and the like have become parts of an ever growing arsenal of defense tools 1 2 . If some knowledge of the nature of the attack is available it would be easily recognizable

TÀI LIỆU LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.