Covariance-Matrix Modeling and Detecting Various Flooding Attacks

洪水(心理学) 服务拒绝攻击 协方差矩阵 计算机科学 协方差 基质(化学分析) 数学 算法 统计 心理学 材料科学 互联网 万维网 复合材料 心理治疗师
作者
Daniel Yeung,Shuyuan Jin,Xizhao Wang
出处
期刊:IEEE transactions on systems, man, and cybernetics [Institute of Electrical and Electronics Engineers]
卷期号:37 (2): 157-169 被引量:72
标识
DOI:10.1109/tsmca.2006.889480
摘要

This paper presents a covariance-matrix modeling and detection approach to detecting various flooding attacks. Based on the investigation of correlativity changes of monitored network features during flooding attacks, this paper employs statistical covariance matrices to build a norm profile of normal activities in information systems and directly utilizes the changes of covariance matrices to detect various flooding attacks. The classification boundary is constrained by a threshold matrix, where each element evaluates the degree to which an observed covariance matrix is different from the norm profile in terms of the changes of correlation between the monitored network features represented by this element. Based on Chebyshev inequality theory, we give a practical (heuristic) approach to determining the threshold matrix. Furthermore, the result matrix obtained in the detection serves as the second-order features to characterize the detected flooding attack. The performance of the approach is examined by detecting Neptune and Smurf attacks-two common distributed Denial-of-Service flooding attacks. The evaluation results show that the detection approach can accurately differentiate the flooding attacks from the normal traffic. Moreover, we demonstrate that the system extracts a stable set of the second-order features for these two flooding attacks

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
汎影发布了新的文献求助10
刚刚
Akim应助mengdewen采纳,获得10
1秒前
不倦发布了新的文献求助10
1秒前
呼呼发布了新的文献求助10
1秒前
36456657应助谨慎招牌采纳,获得10
2秒前
木子发布了新的文献求助10
2秒前
zzz完成签到,获得积分10
3秒前
追梦完成签到 ,获得积分10
3秒前
无奈书包完成签到,获得积分10
3秒前
CipherSage应助屎味烤地瓜采纳,获得10
3秒前
典雅的俊驰应助yuyu采纳,获得10
4秒前
科研人完成签到,获得积分10
4秒前
4秒前
4秒前
135gcl发布了新的文献求助10
4秒前
4秒前
4秒前
辣椒发布了新的文献求助10
5秒前
金不换发布了新的文献求助10
5秒前
皮凡应助Wellnemo采纳,获得50
6秒前
lalala应助ZengJuan采纳,获得10
6秒前
CodeCraft应助guanyu108采纳,获得10
6秒前
6秒前
hello_25baby完成签到,获得积分10
6秒前
袁圣炜发布了新的文献求助10
7秒前
YANG完成签到,获得积分10
7秒前
8秒前
勤恳元枫发布了新的文献求助30
8秒前
echo发布了新的文献求助10
9秒前
科研通AI2S应助135gcl采纳,获得10
9秒前
奇奇发布了新的文献求助10
9秒前
newyear完成签到,获得积分10
9秒前
Antidote完成签到,获得积分10
9秒前
sal发布了新的文献求助10
9秒前
小蘑菇应助kfc采纳,获得10
9秒前
yye完成签到,获得积分10
10秒前
领导范儿应助zjw采纳,获得10
10秒前
11秒前
QDD完成签到,获得积分20
11秒前
金不换完成签到,获得积分10
11秒前
高分求助中
歯科矯正学 第7版(或第5版) 1004
SIS-ISO/IEC TS 27100:2024 Information technology — Cybersecurity — Overview and concepts (ISO/IEC TS 27100:2020, IDT)(Swedish Standard) 1000
Smart but Scattered: The Revolutionary Executive Skills Approach to Helping Kids Reach Their Potential (第二版) 1000
Semiconductor Process Reliability in Practice 720
GROUP-THEORY AND POLARIZATION ALGEBRA 500
Mesopotamian divination texts : conversing with the gods : sources from the first millennium BCE 500
Days of Transition. The Parsi Death Rituals(2011) 500
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 催化作用 物理化学 免疫学 量子力学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 3231822
求助须知:如何正确求助?哪些是违规求助? 2878819
关于积分的说明 8207793
捐赠科研通 2546186
什么是DOI,文献DOI怎么找? 1375808
科研通“疑难数据库(出版商)”最低求助积分说明 647469
邀请新用户注册赠送积分活动 622616