Real-time analysis of flow data for network attack detection

G Munz, G Carle - … 10th IFIP/IEEE International Symposium on …, 2007 - ieeexplore.ieee.org
With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow
data has become an important research area. It has been shown that flow data can be used …

Flow-based statistical aggregation schemes for network anomaly detection

S Song, L Ling, CN Manikopoulo - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
In this paper, we present a novel Flow-based Statistical Aggregation Schemes (FSAS) for
Network Anomaly Detection. An IP flow is a unidirectional series of IP packets of a given …

[PDF][PDF] A distributed intrusion detection prototype using security agents

V Chatzigiannakis, G Androulidakis… - HP OpenView University …, 2004 - Citeseer
V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, B. Maglaris Network Management &
Optimal Design Lab (NETMODE), ECE Department–National Technical University of Athens …

[PDF][PDF] Artificial neural network for mobile IDS solution

F Barika, K Hadjar, N El-Kadhi - Security and Management, 2009 - researchgate.net
The aim of this paper is to suggest an Artificial Neural Network architecture for decision
making within intrusion detection systems. Taking as starting point the IMA_IDS solution [57] …

A probability approach to anomaly detection with twin support vector machines

W Nie, D He - Journal of Shanghai Jiaotong University (Science), 2010 - Springer
Classification of intrusion attacks and normal network flow is a critical and challenging issue
in network security study. Many intelligent intrusion detection models are proposed, but their …

Adaptive network flow clustering

S Song, Z Chen - 2007 IEEE International Conference on …, 2007 - ieeexplore.ieee.org
Flow level measurements are used to provide insights into the traffic flow crossing a network
link. However, existing flow based network detection devices lack adaptive reconfigure …

Method for one packet aggregation to prevent degradation of network's performance

SW Kim, DW Kang, JK Lee - 2011 6th International Conference …, 2011 - ieeexplore.ieee.org
A normal traffic includes a plurality of packets in the same session, while most attack traffic
consists of single packets generated in a single session. This papar relates to a method for …

Flow-oriented anomaly-based detection of denial of service attacks with flow-control-assisted mitigation

S Song - 2006 - digitalcommons.njit.edu
Flooding-based distributed denial-of-service (DDoS) attacks present a serious and major
threat to the targeted enterprises and hosts. Current protection technologies are still largely …

[引用][C] Μελέτη Της Επίδρασης Δειγματοληψίας Στη Διαδικασία Ανίχνευσης Ανωμαλιών Στο Διαδίκτυο

Α Γεώργιος - 2009