2004
DOI: 10.1007/978-3-540-25978-7_95
|View full text |Cite
|
Sign up to set email alerts
|

A Combined Data Mining Approach for DDoS Attack Detection

Abstract: Abstract. Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not provide effective defense against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. It is necessary to analyze the fundamental features of DDoS attacks because these attacks can easily vary the used port/protocol, or operation method. In this paper, we propose a combined dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 2 publications
0
15
0
Order By: Relevance
“…The effectiveness of the proposed technique is evaluated using KDD CUP 99 dataset and experimental analysis shows encouraging results. Shuyuan Jin, Daniel S. Yeung proposed technique which discusses the effects of multivariate correlation analysis on the DDoS detection and proposes a covariance analysis model for detecting SYN flooding attacks [3]. The simulation results show that this method is highly accurate in detecting malicious network traffic in DDoS attacks of different intensities.…”
Section: Related Workmentioning
confidence: 98%
“…The effectiveness of the proposed technique is evaluated using KDD CUP 99 dataset and experimental analysis shows encouraging results. Shuyuan Jin, Daniel S. Yeung proposed technique which discusses the effects of multivariate correlation analysis on the DDoS detection and proposes a covariance analysis model for detecting SYN flooding attacks [3]. The simulation results show that this method is highly accurate in detecting malicious network traffic in DDoS attacks of different intensities.…”
Section: Related Workmentioning
confidence: 98%
“…Mihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, and Jungchan Na proposed a technique which presents a combined data mining approach for modeling the traffic pattern of normal and diverse attacks [3]. This approach uses the automatic feature selection mechanism for selecting the important attributes.…”
Section: Related Workmentioning
confidence: 99%
“…An unexpectedly high rate of incoming traffic is by far the most conspicuous indicator of a flooding DoS attack. Similar measurements, such as the number of packets per flow are often used in detection mechanisms [15].…”
Section: Selecting the Input Featuresmentioning
confidence: 99%
“…For example, the authors of [29] have designed the Statistical Pre-Processor and Unsupervised Neural Net based Intrusion Detector (SPUNNID), in which the statistical pre-processor is used to extract features from packets, and the feature vector is changed to numerical form and fed to an unsupervised Adaptive Resonance Theory net (ART). Neural networks for DoS detection are also used in [15], which follows a data mining approach. In [28], a scheme is presented which comprises a collector of the appropriate data fields from the incoming packets, a feature estimator that evaluates the frequencies for the encoded data, and a radial basis function neural network detector to characterise the incoming traffic as normal or DoS.…”
Section: Introductionmentioning
confidence: 99%