Presentation 2012-03-16
A Behavior-based Detection Method for Outbreaks of Low-rate Attacks
Yaokai FENG, Yoshiaki HORI, Kouichi SAKURAI, Jun'ichi TAKEUCHI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number of volume-based detection techniques that monitor the aggregate or per link traffic load of a network are able to identify anomalies that trigger significant traffic volume changes, they are not applicable to low-rate attacks. Because of this, the problem of low-rate attacks has been attracting many researchers in the community of network security. In this study, we propose for the first time a method based on the normal traffic mode for detecting outbreaks of low-rate attacks. Some behavior-based approaches have been proposed for anomaly detections. They, however, are not able to be used for low-rate attacks. The experimental result indicates our proposal is efficient.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Anomaly detection / Low-rate attack / behavior-based / normal behavior mode
Paper # ICSS2011-45
Date of Issue

Conference Information
Committee ICSS
Conference Date 2012/3/9(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Behavior-based Detection Method for Outbreaks of Low-rate Attacks
Sub Title (in English)
Keyword(1) Anomaly detection
Keyword(2) Low-rate attack
Keyword(3) behavior-based
Keyword(4) normal behavior mode
1st Author's Name Yaokai FENG
1st Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT)()
2nd Author's Name Yoshiaki HORI
2nd Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
3rd Author's Name Kouichi SAKURAI
3rd Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
4th Author's Name Jun'ichi TAKEUCHI
4th Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
Date 2012-03-16
Paper # ICSS2011-45
Volume (vol) vol.111
Number (no) 495
Page pp.pp.-
#Pages 6
Date of Issue