Aberrant Behavior Detection in Time Series for Network Monitoring
LISA '00 Proceedings of the 14th USENIX conference on System administration
Computer system performance problem detection using time series models
Usenix-stc'93 Proceedings of the USENIX Summer 1993 Technical Conference on Summer technical conference - Volume 1
Hi-index | 0.00 |
The Internet provides a wealth of information, convenience, and value to its users, but this accessibility makes it extremely vulnerable to motivated and well-equipped users intent on disrupting the flow of information or using it for personal gain. The Internet is becoming the pervasive means of communications for data in particular. However, its pervasiveness has also generated many security problems, such as authentication, data confidentiality, data integrity, intrusion etc., among which, Denial-of-service (DoS) and Distributed DoS (DDoS) pose significant problems, as they are disruptive to the useful traffics and are hard to prevent. In a mobile ad-hoc networks, where the nodes are typically devices with limited bandwidth, computational resources, battery power and unpredictable routing topology, additional constraint is placed on detection and tracing technique to locate the attack sources efficiently. In this paper an overview is made on the issues of trace back in the context of mobile IPv6. A technique has been proposed then which consists of ICMPv6 Trace back with Cumulative path (ITrace-CP), and thereby retrieves the entire attack path information in the ICMPv6 trace back message to facilitate the trace back mechanism in a mobile ad hoc network.