Improvement of protocol anomaly detection based on Markov Chain and its application

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As we know, a lot of network attacks come from abusing different network protocols and several new attacks violate the protocol standard. Kumar Das first presented the concept of the protocol anomaly detection. The idea of protocol anomaly detection is not new but interesting. It aims to set up models for proper use of protocols and any behavior that departs from the models will be regarded as an intrusive or suspicious one. In this paper, we made some improvements that aim at the lack of stochastic protocol models based on Markov Chain and made some evaluations for that presented by Juan M. Some necessary states are added to the protocol model. Furthermore, the initial and transition probabilities are more precise. Also, we propose to combine Chi-Square Distance into Markov Chain method to detect protocol anomaly. The experimental results show that SYN Flooding attack can be detected efficiently by the new approach. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Qin, Z., Li, N., Zhang, D. F., & Bian, N. Z. (2005). Improvement of protocol anomaly detection based on Markov Chain and its application. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3759 LNCS, pp. 387–396). https://doi.org/10.1007/11576259_43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free