Abstract. Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not provide effective defense against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. It is necessary to analyze the fundamental features of DDoS attacks because these attacks can easily vary the used port/protocol, or operation method. In this paper, we propose a combined data mining approach for modeling the traffic pattern of normal and diverse attacks. This approach uses the automatic feature selection mechanism for selecting the important attributes. And the classifier is built with the theoretically selected attribute through the neural network. And then, our experimental results show that our approach can provide the best performance on the real network, in comparison with that by heuristic feature selection and any other single data mining approaches.
Abstract-The use of SCADA systems has been increased since the 1960s as a need arose to more efficiently monitor and control the status of remote equipment. And they are becoming more and more susceptible to cyber-attacks due to utilize standard protocols and increase connectivity. The objective of this paper is to introduce our on-going work and discuss challenges and opportunities for preventing network and application protocol attacks on SCADA systems.
Wireless devices become familiar. We regard digital utilities' developing as a middle of way to ubiquitous computing environment. This change of network access environment at the end user brings more possibility to hack wireless devices. Lost of a device brings side-effects of private information problems. Thus, we propose an integrated wire/wireless device management system. The proposed system monitors devices, manages device status and modifies package's status for the remote user. This entire system management controlled in accordance policies set-up by users. The system is based on SNMP which widely used for a node management. Hence, the proposed system can be easily adapted in existing SNMP systems. With the system, the owner of device can manage his own device remotely. A domain administrator can evaluate security vulnerability in the domain and reflect the evaluated security vulnerability for the securer computing environment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.