C4.5: programs for machine learning
C4.5: programs for machine learning
Fuzzy logic, neural networks, and soft computing
Communications of the ACM
Prevention of Congestion in Packet-Switched Multistage Interconnection Networks
IEEE Transactions on Parallel and Distributed Systems
An introduction to Kolmogorov complexity and its applications (2nd ed.)
An introduction to Kolmogorov complexity and its applications (2nd ed.)
Protecting web servers from distributed denial of service attacks
Proceedings of the 10th international conference on World Wide Web
Machine Learning
Towards Flexible Multi-Agent Decision-Making Under Time Pressure
IJCAI '99 Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence
Soft Computing and Tools of Intelligent Systems Design: Theory and Applications
Soft Computing and Tools of Intelligent Systems Design: Theory and Applications
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
MULTOPS: a data-structure for bandwidth attack detection
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Dynamic muscle fatigue detection using self-organizing maps
Applied Soft Computing
On the defense of the distributed denial of service attacks: an on-off feedback control approach
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
DDoS Attack Detection Algorithm Using IP Address Features
FAW '09 Proceedings of the 3d International Workshop on Frontiers in Algorithmics
DDoS attack detection method based on linear prediction model
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
Joining the Dots: Joining the dots
Network Security
Service-independent payload analysis to improve intrusion detection in network traffic
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
Hi-index | 0.00 |
The ability to dynamically collect and analyze network traffic and to accurately report the current network status is critical in the face of large-scale intrusions, and enables networks to continually function despite of traffic fluctuations. The paper presents a network traffic model that represents a specific network pattern and a methodology that compiles the network traffic into a set of rules using soft computing methods. This methodology based upon the network traffic model can be used to detect large-scale flooding attacks, for example, a distributed denial-of-service (DDoS) attack. We report experimental results that demonstrate the distinctive and predictive patterns of flooding attacks in simulated network settings, and show the potential of soft computing methods for the successful detection of large-scale flooding attacks.