2013
DOI: 10.1016/j.comcom.2013.01.013
|View full text |Cite
|
Sign up to set email alerts
|

Detecting latent attack behavior from aggregated Web traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 42 publications
0
8
0
Order By: Relevance
“…This detection system is dependent on forming of ordinary behavioural models and conclude any attempt that is not covered within this model as malicious behaviours [9]. Nonetheless, higher false alarm or false positives are the main imperfection of this detection systems [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This detection system is dependent on forming of ordinary behavioural models and conclude any attempt that is not covered within this model as malicious behaviours [9]. Nonetheless, higher false alarm or false positives are the main imperfection of this detection systems [10].…”
Section: Introductionmentioning
confidence: 99%
“…Seeing facts, for last two decades, an anomaly detection system that utilizes data mining approaches has attracted researcher interest, particularly within the concept of intrusion detection [10]- [12]. Nevertheless, maximizing the true positive (malicious behaviours which detected as malicious) and true negative (non-malicious behaviours which detected as non-malicious) as well as minimizing the false positive (non-malicious behaviours which detected as malicious) and false negative (malicious behaviours which detected as nonmalicious) are not much enhanced as a whole.…”
Section: Introductionmentioning
confidence: 99%
“…Denial-of-service is not only the issue in the internet but rather it changes the mandatory or required information when there would be slight change in the protocols. The emergence of Distributed denial-of-service exists in the base of the Internet architecture [1] and there are so many methods through which we will detect the DDoS attack as in [2] [3]. There are following types of attacks that come against the infrastructure of Internet.…”
Section: Introductionmentioning
confidence: 99%
“…From real time experiments they proved that rate limiting is effective in mitigating a network from DDoS attacks. Y. Xie, et al, [10] has discussed about a new application-layer indirect attack which exploits the communication mechanism of proxy server to attack the targets. They have proposed a server-side defense scheme to resist such indirect attacks by describing the dynamic behavior process of aggregated traffic using improved semiMarkov model.…”
Section: Several Other Different Detection Mechanisms Have Also Been mentioning
confidence: 99%