2010 IEEE 2nd International Advance Computing Conference (IACC) 2010
DOI: 10.1109/iadcc.2010.5422996
|View full text |Cite
|
Sign up to set email alerts
|

A flow based anomaly detection system using chi-square technique

Abstract: Various tools, which are capable to evade different security mechanisms like firewall, IDS and IPS, exist and that helps the intruders for sending malicious traffic to the network or system. So, inspection of malicious traffic and identification of anomalous activity is very much essential to stop future activity of intruders which can be a possible attack. In this paper we present a flow based system to detect anomalous activity by using IP flow characteristics with chi-square detection mechanism. This system… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
2

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 12 publications
0
1
0
2
Order By: Relevance
“…Ref. [21] developed a flow-based system that detects abnormal activity by applying the chisquared technique to IP flow characteristics. Some studies have examined packet payloads.…”
Section: Rule-based Approachesmentioning
confidence: 99%
“…Ref. [21] developed a flow-based system that detects abnormal activity by applying the chisquared technique to IP flow characteristics. Some studies have examined packet payloads.…”
Section: Rule-based Approachesmentioning
confidence: 99%
“…Tradicionalmente, é uma ação preliminar realizada por um atacante para descobrir vulnerabilidades no dispositivo alvo, a fim de que ela seja explorada. Com o objetivo mais abrangente, o network scan visa a descoberta de dispositivos ativos na rede coletando suas informações, tais como o sistema operacional utilizado e os serviços oferecidos por eles [51]. Na propagação de um worm, as portas dos dispositivos de rede também são sondadas [88].…”
Section: Comportamento Maliciosounclassified
“…As informações obtidas de cada pacote vão além do seu cabeçalho, possibilitando a inspeção do payload para identificar anomalias específicas (e.g., vírus). Este mecanismo é, contudo, muito dispendioso, pois o processamento de todos os pacotes transmitidos em grandes redes requer alta capacidade de processamento e armazenamento, inviabilizando sua utilização [51].…”
Section: Fluxos Ipunclassified