2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.38
|View full text |Cite
|
Sign up to set email alerts
|

Visual Analytics Model for Intrusion Detection in Flood Attack

Abstract: Flood attacks are common forms of Distributed Denial-of-Service (DDoS) attack threats on internet in nature. This has necessitated the need for visual analysis within an intrusion detection system to identify these attacks. The challenges are how to increase the accuracy of detection and how to visualize and present flood attacks in networks for early detection. In this paper, we introduce three coefficients, which not only classify the behaviors of flood attacks, but also measure the system performance under … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…According to Density‐Workload model , the victim's system workload λ that handles the flood attacks is defined as leftcenter2.2emα1emβ1emγ1emδ0.75emελ=centerλ11λ12λ13λ14λ15centerλ21λ22λ23λ24λ25centerλ31λ32λ33λ34λ35centerλ41λ42λ43λ44λ45centerλ51λ52λ53λ54λ55centercpucenterramcenterhddcenternetcentersys where cpu is the system CPU, ram is the system memory, hdd is the system storage, net is the system network bandwidth and sys is the system configuration. α , β , γ , δ and ε illustrate particular attributes in the 5Ws dimensions that the victim's system must handle.…”
Section: Ws Density Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…According to Density‐Workload model , the victim's system workload λ that handles the flood attacks is defined as leftcenter2.2emα1emβ1emγ1emδ0.75emελ=centerλ11λ12λ13λ14λ15centerλ21λ22λ23λ24λ25centerλ31λ32λ33λ34λ35centerλ41λ42λ43λ44λ45centerλ51λ52λ53λ54λ55centercpucenterramcenterhddcenternetcentersys where cpu is the system CPU, ram is the system memory, hdd is the system storage, net is the system network bandwidth and sys is the system configuration. α , β , γ , δ and ε illustrate particular attributes in the 5Ws dimensions that the victim's system must handle.…”
Section: Ws Density Modelmentioning
confidence: 99%
“…According to Density-Workload model [13], the victim's system workload λ that handles the flood attacks is defined as…”
Section: Density Correlation Cross Multiple Datasetsmentioning
confidence: 99%
“…All network traffic that flows to the victim site (dip=k) is a set F victim , which is defined as (1) , f (2) , f (3) , . .…”
Section: B Second-layer Densitiesmentioning
confidence: 99%
“…In this paper, we future develop our visual analytics model shown in [3] and [8] to analyze the flood attacks. Firstly, we analyze the characteristics of flood attacks and their behaviors based on the flood traffic through the Internet, and then establish the traffic patterns of flood attacks to form the sending-density and the receiving-density.…”
Section: Introductionmentioning
confidence: 99%