A flow-based method for abnormal network traffic detection

147Citations
Citations of this article
107Readers
Mendeley users who have this article in their library.
Get full text

Abstract

One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network performance. This paper presents an abnormal network traffic detecting method and a system prototype. By aggregating packets that belong to the identical flow, we can reduce processing overhead in the system. We suggest a detecting algorithm using changes in traffic patterns that appear during attacks. This algorithm can detect even mutant attacks that use a new port number or changed payload, while signature-based systems are not capable of detecting these types of attacks. Furthermore, the proposed algorithm can identify attacks that cannot be detected by examining only single packet information.

Cite

CITATION STYLE

APA

Kim, M. S., Kong, H. J., Hong, S. C., Chung, S. H., & Hong, J. W. (2004). A flow-based method for abnormal network traffic detection. In IEEE Symposium Record on Network Operations and Management Symposium (pp. 599–612). https://doi.org/10.1109/noms.2004.1317747

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free