2020
DOI: 10.1007/s11042-020-08653-8
|View full text |Cite
|
Sign up to set email alerts
|

A robust anomaly detection method using a constant false alarm rate approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(14 citation statements)
references
References 39 publications
0
14
0
Order By: Relevance
“…In this work, we focus on detecting TCP‐based DoS/DDoS attacks by utilizing the methodology presented in AsSadhan and Mouran 9 . We started by extracting TCP traffic from the network traffic and decompose them into control and data planes, as in previous studies 9‐11,53 . The packets that set up, preserve, or turn off a connection are treated as control packets.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this work, we focus on detecting TCP‐based DoS/DDoS attacks by utilizing the methodology presented in AsSadhan and Mouran 9 . We started by extracting TCP traffic from the network traffic and decompose them into control and data planes, as in previous studies 9‐11,53 . The packets that set up, preserve, or turn off a connection are treated as control packets.…”
Section: Methodsmentioning
confidence: 99%
“…Decomposing traffic into control and data can provide more information about the traffic behavior. This information may increase the accuracy and efficiency of results 9‐11,53 …”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on these historical data, an attempt was made to detect all potential data exfiltration attempts using the adaptive threshold. The algorithm used in the implementation of the adaptive threshold was Cell-Averaging Constant False Alarm Rate (CA-CFAR) [58] which is probably the most widely used CFAR detector. It was used as it can adapt to a constantly changing networking environment.…”
Section: Experimental Implementation and Methodologymentioning
confidence: 99%
“…The data analysis engine created for the Passive DNS/CETP module determines the decision thresholds adaptively using the Cell Averaging -Constant False Alarm Rate (CA-CFAR) algorithm [58]. This algorithm is very good for detecting signals in radars and at the same time it is suitable for the detection in varying network conditions [58]. The detection is straightforward.…”
Section: Cell Averaging-constant False Alarm Ratementioning
confidence: 99%