2019 IEEE 18th International Symposium on Network Computing and Applications (NCA) 2019
DOI: 10.1109/nca.2019.8935067
|View full text |Cite
|
Sign up to set email alerts
|

Early Intrusion Detection for OS Scan Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…A study using an approach based on Dempster–Shafer evidence theory produced a solid groundwork for detecting port scan traffic [ 51 ]. Another study proposed a new evaluation metric for IDS, which was reported to take less time to identify port scan data than previous metrics [ 52 ]. Neither of these studies included IoT devices, and there is currently a lack of research into OS scans in regards to IoT devices.…”
Section: Background and Related Workmentioning
confidence: 99%
“…A study using an approach based on Dempster–Shafer evidence theory produced a solid groundwork for detecting port scan traffic [ 51 ]. Another study proposed a new evaluation metric for IDS, which was reported to take less time to identify port scan data than previous metrics [ 52 ]. Neither of these studies included IoT devices, and there is currently a lack of research into OS scans in regards to IoT devices.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In Kitsune, it has 1752987 instances of training sample and 751280 samples of testing samples. The OS scan works by using the TCP/IP stack fingerprinting method [39]. Service analytics works by using the N map-service-probes database to identify services performed on a targeted host.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…There is some research on Early Warning Systems (EWS), especially to avoid malware propagation, that explore different alternatives such as bayesian inference [16], Kalman filter [17] or sensors [18], but the evaluation is mainly focused on the identification of potential attacks in a timeline, without presenting a proper time-aware performance metric. More closely related to this work, [19] explores different methods for the early detection of cyber attacks using ERDE as the main performance metrics, while on [20] the authors focus on Operating System scan attacks and include F 1 − latency as time-aware evaluation metric.…”
Section: Related Workmentioning
confidence: 99%
“…Also, some variants of the ERDE metric can be found in the literature. For example, [23] defines the ERDE % o that is based on the percentage of items processed, instead of the number of items and in [20], a normalized version of the ERDE metric is defined using mix-max normalization.…”
Section: A Standard Metricsmentioning
confidence: 99%