2008 16th IEEE International Conference on Networks 2008
DOI: 10.1109/icon.2008.4772645
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of TCP flow data for traffic anomaly and scan detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…In port scanning, there are dozens of techniques that can be used by an attacker to verify open ports on the victim's server. As revealed by Muraleedharan [6], the most common port scanning techniques used are TCP SYN scan, TCP Connect scan, UDP scan and stealth scan. TCP SYN scan is the most commonly used because it does not establish a connection between the attacker and the victim's machine and is not logged by some of event tracking tools.…”
Section: Related Workmentioning
confidence: 99%
“…In port scanning, there are dozens of techniques that can be used by an attacker to verify open ports on the victim's server. As revealed by Muraleedharan [6], the most common port scanning techniques used are TCP SYN scan, TCP Connect scan, UDP scan and stealth scan. TCP SYN scan is the most commonly used because it does not establish a connection between the attacker and the victim's machine and is not logged by some of event tracking tools.…”
Section: Related Workmentioning
confidence: 99%
“…Then we calculate the hosts' connection degree in these flows, and find that there are some hosts with connection degree more than 5000 in IPv4 traces, the maximum connection degree reaches above 7000. Those statistical characteristics as shown in Table 5 reveal those flows are generated by scanning-like attacks [37,38].…”
Section: Abnormal Behavior Detection Based On One-way Flow Analysismentioning
confidence: 99%
“…In our previous work on flow data analysis [16], we identified the behavior of flow data with respect to different transport layer protocol like TCP, UDP and ICMP. By using flow information different types of anomaly detection can be done.…”
Section: Related Workmentioning
confidence: 99%