2018 IEEE Symposium Series on Computational Intelligence (SSCI) 2018
DOI: 10.1109/ssci.2018.8628797
|View full text |Cite
|
Sign up to set email alerts
|

Detecting cyber-attacks using a CRPS-based monitoring approach

Abstract: Cyber-attacks can seriously affect the security of computers and network systems. Thus, developing an efficient anomaly detection mechanism is crucial for information protection and cyber security. To accurately detect TCP SYN flood attacks, two statistical schemes based on the continuous ranked probability score (CRPS) metric have been designed in this paper. Specifically, by integrating the CRPS measure with two conventional charts, Shewhart and the exponentially weighted moving average (EWMA) charts, novel … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Harrou et al [34] designed an anomaly detection system to detect TCP SYN flood attacks based on the 1999 DAPRA dataset. TCP SYN floods are utilized in DoS and DDoS attacks.…”
Section: A Cybercrime Detection Using Statistical Methodsmentioning
confidence: 99%
“…Harrou et al [34] designed an anomaly detection system to detect TCP SYN flood attacks based on the 1999 DAPRA dataset. TCP SYN floods are utilized in DoS and DDoS attacks.…”
Section: A Cybercrime Detection Using Statistical Methodsmentioning
confidence: 99%
“…3) The use of Exponentially Weighted Moving Average (EWMA) [22,23] to overcome the noisy nature of the network.…”
Section: Introductionmentioning
confidence: 99%
“…Accordingly, this work focuses on developing an efficient detection mechanism to detect TCP SYN flood, Smurf attack, and ICMPv6-based DOS and DDOS attacks. Several mechanisms were developed in the literature to prevent and protect networks from TCP SYN flood attacks [8,9]. In [10], a strategy integrating the intrusion detection system Snort with two commonly used software-defined networking (SDN) controllers, namely ODL (Opendaylaight) and ONOS (Open Networking system), is introduced.…”
Section: Introductionmentioning
confidence: 99%