2014
DOI: 10.1186/1687-417x-2014-5
|View full text |Cite
|
Sign up to set email alerts
|

How can sliding HyperLogLog and EWMA detect port scan attacks in IP traffic?

Abstract: IP networks are constantly targeted by new techniques of denial of service attacks (SYN flooding, port scan, UDP flooding, etc), causing service disruption and considerable financial damage. The on-line detection of DoS attacks in the current high-bit rate IP traffic is a big challenge. We propose in this paper an on-line algorithm for port scan detection. It is composed of two complementary parts: First, a probabilistic counting part, where the number of distinct destination ports is estimated by adapting a m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 20 publications
0
9
0
1
Order By: Relevance
“…Detecting online a change of the process parameters in data streams is an important issue as it can have several interpretations depending on the application domain. In Reference 166, the authors showed that an abrupt increase in the number of destination ports in IP traffic is an efficient criterion to detect port scan attacks. Given that the amount of internet and computer traffic is growing and increasing at a fast rate, monitoring the network in real‐time becomes a challenging task.…”
Section: Challenges and Open Issuesmentioning
confidence: 99%
“…Detecting online a change of the process parameters in data streams is an important issue as it can have several interpretations depending on the application domain. In Reference 166, the authors showed that an abrupt increase in the number of destination ports in IP traffic is an efficient criterion to detect port scan attacks. Given that the amount of internet and computer traffic is growing and increasing at a fast rate, monitoring the network in real‐time becomes a challenging task.…”
Section: Challenges and Open Issuesmentioning
confidence: 99%
“…EWMA, which was proposed by Roberts [ 33 ], is an efficient statistical technique used in detecting small shifts in time-series data. It functions by first defining a threshold that delimits a standard behaviour before periodically handling updates on average of the observed data traffic [ 34 ]. EWMA is also characterised with its low complexity because the weighted average only needs to be updated for each newly observed data.…”
Section: Ewma Algorithmmentioning
confidence: 99%
“…In summary, our jamming detection technique consists of two phases; the first phase is the training phase that involves the capture of normal IAT from legitimate member nodes to the cluster head and also from the cluster heads to the base station to initialize its parameters and obtain a normal profile. Just like in the work of Chabchoub et al [ 34 ], no change point detection process will be performed during this phase. In the second phase, the test phase, a pattern change is detected during a jamming attack on a per packet basis using the EWMA algorithm.…”
Section: Ewma Algorithmmentioning
confidence: 99%
“…HLL requires m bytes and its standard deviation is σ ≈ 1.04 √ m . SWHLL extends HLL to sliding windows [9,22], and was used to detect attacks such as port scans [10]. SWAMP's space requirement is proportional to W and thus, it is only comparable in space to HLL when ε −2 = O(W ).…”
Section: Count Distinctmentioning
confidence: 99%