Intrusion detection with CUSUM for TCP-based DDoS

9Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

DDoS(Distributed Denial of Service) is the most troublesome attack nowadays, especially for those people whose operational environment relies on network services and/or the Internet. However, attackers often penetrate innocent routers and hosts to make them unwittingly participate in such a large scale attack as zombies or reflectors. In this paper, we propose an Intrusion Detection System (IDS), named CUSUM Intrusion Detection System (CIDS), which invokes CUSUM as its detection algorithm and logically divides Internet into many autonomous network management units (NMUs), each deploys a CIDS to discover attacks and identify what role a client in such an attack acts as. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Leu, F. Y., & Yang, W. J. (2005). Intrusion detection with CUSUM for TCP-based DDoS. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3823 LNCS, pp. 1255–1264). https://doi.org/10.1007/11596042_127

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free