Based on Hurst Parameter Estimation DoS Detection

Article Preview

Abstract:

Most researches regard the real traffic has self_similarity,so traditional model based passion or Markov can’t adapt to the real traffic.In order to resolve these problems,the estimation is used based on Hurst parameter to detect DoS attack,researching on the affect of Hurst paramerter change brought by DoS attack,By analyzing the 1998 DARPA intrusion detection evaluation dataset show that this method detect DoS attack,and is more reliable on the recognition of all kinds of DoS attack than any other method based on measure precision.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2325-2328

Citation:

Online since:

February 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Kendall K. A database of computer attacks for the evaluation of intrusion detection systems[D]. Boston: Massachusetts Instituteof Technology, (1999).

Google Scholar

[2] Zhang Xueqin, Gu Chunhua, Lin Jiajun. The challenge and development of intrusion detection technology in [J]. computer engineering and design, 2004, 25 ( 7): 1096-1099.

Google Scholar

[3] Park K, Willinger W. Self-similar network traffic: An overview, self-similar network traffic and performance evaluation[C], NewYork: Wiley-Interscience, 2000. 1-39.

DOI: 10.1002/047120644x.ch1

Google Scholar

[4] Abry P, Flandrin P, Taqqu MS, et al. Wavelets for the analysis, es-timation and synthesis of scaling data[Z]. Boston, 2000. 134-156.

Google Scholar

[5] Morris R, Lin D. Variance of aggregated web traffic[C]. Procee-dings of IEEE INFOCOM 2000. 360-366.

Google Scholar

[6] Kettani H. A novel approach to the estimation of the long-range dependence parameter [D]. University of Wisconsin-Madison, (2000).

Google Scholar

[7] Zhang Jianzhong, Xu Jingdong, Phil into a book, and so on. Extensible anomaly detection system based on Realization of [J]. computer engineering and design, 2005, 26 ( 7): 1722-1725.

Google Scholar

[8] Peng Xinguang, Ma Xiaoli. The session attribute optimization network anomaly detection model of [J]. computing Computer engineering and design, 2005, 26 ( 11): 2945-2948.

Google Scholar