2013
DOI: 10.4172/2332-0796.1000110
|View full text |Cite
|
Sign up to set email alerts
|

A Fluid-Based Approach for Modeling Network Activities

Abstract: based DoS network activities are not isolated, but related as different stages of a series of cyber-attacks. Intuitively, their traces could be caught even though they are carefully hidden behind normal network activities and have forged footprints. For example, the distribution of inter-arrival time of a series of malicious requests on a web-server could be identified even through those malicious requests implemented with forged IP headers. In order to launch a successful flooding-based DoS attack, the hacker… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 32 publications
(37 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?