2007
DOI: 10.1109/fuzzy.2007.4295666
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network

Abstract: Abstract-Denial of Service (DoS) is a prevalent threat in today's networks. While such an attack is not difficult to launch, defending a network resource against it is disproportionately difficult, and despite the extensive research in recent years, DoS attacks continue to harm. The first goal of any protection scheme against DoS is the detection of its existence, ideally long before the destructive traffic build-up. In this paper we propose a generic approach which uses multiple Bayesian classifiers, and we p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 52 publications
(33 citation statements)
references
References 24 publications
(27 reference statements)
0
32
0
Order By: Relevance
“…The first goal of any protection scheme against DoS attack is the early detection (ideally long before the destructive traffic build-up) of its existence [22,21]. In order to disarm DoS/DDoS attacks and any deviation, not only the detection of the malevolent behavior must be achieved, but the network traffic belonging to the attackers should be also blocked [23,24,25].…”
Section: Introductionmentioning
confidence: 99%
“…The first goal of any protection scheme against DoS attack is the early detection (ideally long before the destructive traffic build-up) of its existence [22,21]. In order to disarm DoS/DDoS attacks and any deviation, not only the detection of the malevolent behavior must be achieved, but the network traffic belonging to the attackers should be also blocked [23,24,25].…”
Section: Introductionmentioning
confidence: 99%
“…Other extensions concern admission control (Gelenbe, Sakellari, and D'arienzo [134]) and distributed denial of service (DDoS) defense (Gelenbe, Gellman, and Loukas [82], Gelenbe and Loukas [117]). In DDoS, network attacks can be detected using CPN as QoS violations, and CPN can be modified to automatically counter-attack by tracing the attacking traffic and using CPN ACK packets to give "drop" orders regarding the attacking traffic to routers upstream (Oke, Loukas, and Gelenbe [170]). Network worms were also considered, and CPN was used to reroute the users' traffic to avoid the infected nodes (Sakellari and Gelenbe [176], Sakellari, Hey, and Gelenbe [177]).…”
Section: Autonomic Systems and Cognitive Packet Network (Cpns)mentioning
confidence: 99%
“…It also interacts with existing network management systems to reduce computational overhead, storage requirements and false alarm rate. The use of a supervised learning RNN is motivated by its capability of classifying known patterns such as signaling storms whose characteristics and root causes are well understood [4,5,21,40], and also its previous success in detecting traditional DoS attacks in the Internet [35,52].…”
Section: Contributions Of the Papermentioning
confidence: 99%