The causality analysis of protocol measures for detection of attacks based on network

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

New intrusions have being tried continuously due to vulnerability of TCP/IP on the computer networks. Many studies have been progressed about the method that is based on the signature and anomaly behavior in order to detect the attacks using vulnerability of networks. However the detection of intrusion from an enormous network data is very difficult and required much load of work. In this paper, for the effective detection, we studied the combination of network measures from the data packets which is generated by various DoS attacks using the vulnerability of TCP/IP. As the result, we were able to find the causality of network measures for the DoS attacks based on networks and detect similar attacks as well as existing attacks using it. Furthermore, the detection by possible combination of selected measures has a high accurate rate, and also the causality of network measures can be used to generate real-time detection patterns. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Cheong, I. A., Kim, Y. M., Kim, M. S., & Noh, B. N. (2004). The causality analysis of protocol measures for detection of attacks based on network. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3090, 962–972. https://doi.org/10.1007/978-3-540-25978-7_97

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free