Sciweavers

23 search results - page 2 / 5
» Detecting Distributed Denial of Service Attack Traffic at th...
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 2 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
IADIS
2004
13 years 6 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
IWCMC
2010
ACM
13 years 10 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
DSN
2004
IEEE
13 years 8 months ago
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are bei...
Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Si...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 5 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith