2011
DOI: 10.1007/978-3-642-25243-3_31
|View full text |Cite
|
Sign up to set email alerts
|

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization

Abstract: Abstract. The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate characterization for network traffic records make the techniques suffer from low accuracy in detection. Although researches have been conducted and attempted to overcome this problem, there are some constraints in these works. In this paper, we propose a technique based on Euclidean Distance Map (EDM) for optimal feature extractio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Besides entropy, also in the category of probability distance measures is the popular Kullback-Leibler distance (KLD), or information gain. The KLD is formulated as shown in (23), where P 1 and P 2 are probability distributions over the domain X, p 1 (x) is the probability of x occurring in P 1 , p 2 (x) is the…”
Section: B Types Of Measuresmentioning
confidence: 99%
See 2 more Smart Citations
“…Besides entropy, also in the category of probability distance measures is the popular Kullback-Leibler distance (KLD), or information gain. The KLD is formulated as shown in (23), where P 1 and P 2 are probability distributions over the domain X, p 1 (x) is the probability of x occurring in P 1 , p 2 (x) is the…”
Section: B Types Of Measuresmentioning
confidence: 99%
“…Eid et al [21] develop a feature selection method for Network Intrusion Detection (NID) in which the first layer uses Kullback-Leibler distance (KLD) to rank the features in the dataset. KLD, or information gain, is formulated as shown in (23), where P 1 and P 2 are probability distributions over the domain X, p 1 (x) is the probability of x occurring in P 1 , p 2 (x) is the probability of x occurring in P 2 , and a is the base in which the KLD is calculated.…”
Section: A Feature Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…And then, our experimental results show that our approach can provide the best performance on the real network, in comparison with that by heuristic feature selection and any other single data mining approaches. Aikaterini Mitrokotsa, Christos Douligeris proposed a technique which presents an approach that detects Denial of Service attacks using Emergent Self-Organizing Maps [5]. The approach is based on classifying "normal" traffic against "abnormal" traffic in the sense of Denial of Service attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In Existing system Mahalabonis Distance and covariance matrix is used but due to high time complexity in proposed system Euclidian distance [5] is used in Multivariate correlation analysis. There are basically main three algorithms are used in proposed system, namely Normal Profile generation, Attack Detection and Behavioral Rules generation algorithms.…”
Section: Proposed Algorithmsmentioning
confidence: 99%