Detection of Denial-of-service Attacks

来源 :计算机工程 | 被引量 : 0次 | 上传用户:yangxiaoxi21
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks. Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYN-flood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection. Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks. Resource consumption of DOS attacks could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYN-flood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.
其他文献
夏顺光,永州市第九中学校长,中学高级教师,省级骨干教师,湖南省中学理化学会会员,永州市教育学会常务理事,永州市初中校长工作研究专业委员会副理事长。 Xia Shunguang, Yon
近来在网上发现一个网站可以免费注册“.com/.net/.org”顶级域名(免费使用时间为一年),同时提供免费网站空间,还没有任何广告,感觉真是不错,所以赶紧介绍给大家。 当然了,
步入耄耋之年的电白县霞洞镇关工委副主任、霞洞村关工委主任王恒华,出生于古楼村一个贫民家庭,在其前辈训诲下,勤奋好学,幼年时在私塾破蒙;青少年时半工半读,利用寒暑假打工
UED:原作设计从创立至今的15年时间,想必是一个沉潜的探索历程,在这段时间里原作设计的设计思想是否有着渐进性的发展轨迹?章明&张姿:事实上,在过去的近十年的光景中,我们一
上高县是钩端螺旋体病(简称钩体病)流行的老疫区,1966~1973年间曾发生多起暴发流行,随后疫情虽一度有所下降,但从1987年起又明显上升,近10年来发病率波动在58.66/10万~289.89/10万,成为我县主要传染病之一。为系统了解
“干什么事情,你自己选择,但只要选了干什么,就一定要干好了!”这是母亲自小给茅侃侃强调的道理。 “What to do, you choose, but as long as the election of what, we mu
近年来,安徽巢湖市坚持以实施德育工程、净化工程、示范工程、体验工程、关爱工程“五项工程”为抓手,努力营造有利于未成年人健康成长的社会文化环境。一是组织实施德育工程
IP应用层是TCP/UDP层之上的部分,它是直接的业务层,或是为业务层提供增值服务。当然,业务是端到端的,增值服务也是端到端的。这里主要讲IP应用层的一些增值服务层。 The IP
这些英雄不是什么具有持久借鉴意义的榜样。从他们身上吸取的经验教训通常仅仅表明,很久以前,对于我们现在所谓的最佳实践,人们有一种直觉上的理解。军事比喻很自然地出现在
由中国水利水电科学研究院承担的名列国家“九五”重点科技攻关《重点工程混凝土安全性》项目的新型混凝土裂缝检测仪,目前研制开发成功。   新型混凝土裂缝检测仪实际上是