Abstract

/>

Computer network traffic is analyzed via mutual information techniques, implemented using linear and nonlinear canonical correlation analyses, with the specific objective of detecting UDP flooding attacks. NS simulation of HTTP, FTP, and CBR traffic shows that flooding attacks are accompanied by a change of mutual information, either at the link being flooded or at another upstream or downstream link. This observation appears to be topology independent, as the technique is demonstrated on the so-called parking-lot topology, random 50-node topology, and 100-node transit-stub topology. This technique is also employed to detect UDP flooding with low false alarm rate on a backbone link. These results indicate that a change in mutual information provides a useful detection criterion when no other signature of the attack is available.

Original document

The different versions of the original document can be found in:

https://doaj.org/toc/1687-6172,
https://doaj.org/toc/1687-6180
https://doaj.org/toc/1687-6172,
https://doaj.org/toc/1687-6180
http://dx.doi.org/10.1155/2007/90312
https://academic.microsoft.com/#/detail/2104774115
http://dx.doi.org/10.1109/acc.2002.1024008
https://link.springer.com/article/10.1155/2007/90312,
https://core.ac.uk/display/81722736,
https://asp-eurasipjournals.springeropen.com/track/pdf/10.1155/2007/90312,
http://www.asp.eurasipjournals.com/content/pdf/1687-6180-2007-090312.pdf,
https://paperity.org/p/75304561/dynamic-modeling-of-internet-traffic-for-intrusion-detection,
https://asp-eurasipjournals.springeropen.com/articles/10.1155/2007/90312,
http://www.asp.eurasipjournals.com/content/2007/1/090312,
http://asp.eurasipjournals.springeropen.com/track/pdf/10.1155/2007/90312?site=asp.eurasipjournals.springeropen.com,
https://academic.microsoft.com/#/detail/2022314806


DOIS: 10.1155/2007/90312 10.1109/acc.2002.1024008

Back to Top

Document information

Published on 01/01/2006

Volume 2006, 2006
DOI: 10.1155/2007/90312
Licence: Other

Document Score

0

Views 1
Recommendations 0

Share this document

claim authorship

Are you one of the authors of this document?