Detection of unknown DoS attacks by Kolmogorov-complexity fluctuation

4Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Detection of unknown Denial-of-Service (DoS) attacks is a hard issue. What attackers do is simply to consume a large amount of target resources. This simple feature allows attackers to create a wide variety of attack flows, and hence we must find a sophisticated general metric for detection. A possible metric is Kolmogorov Complexity (KC), a measure of the size of the smallest program capable of representing the given piece of data flows because DoS attacks, known or unknown, are anyway launched by computer programs. However, there are no established DoS-detection methods which make use of this possibility. And to make matters worse, it is well known that KG cannot be rigorously computed. In this paper, we compare three different KG estimation methods including a new proposal of our own, and propose a new DoS-detection method by monitoring fluctuation of KC differentials. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Furuya, T., Matsuzaki, T., & Matsuura, K. (2005). Detection of unknown DoS attacks by Kolmogorov-complexity fluctuation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3822 LNCS, pp. 395–406). Springer Verlag. https://doi.org/10.1007/11599548_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free