Presentation | 2012-03-16 A Behavior-based Detection Method for Outbreaks of Low-rate Attacks Yaokai FENG, Yoshiaki HORI, Kouichi SAKURAI, Jun'ichi TAKEUCHI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number of volume-based detection techniques that monitor the aggregate or per link traffic load of a network are able to identify anomalies that trigger significant traffic volume changes, they are not applicable to low-rate attacks. Because of this, the problem of low-rate attacks has been attracting many researchers in the community of network security. In this study, we propose for the first time a method based on the normal traffic mode for detecting outbreaks of low-rate attacks. Some behavior-based approaches have been proposed for anomaly detections. They, however, are not able to be used for low-rate attacks. The experimental result indicates our proposal is efficient. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Anomaly detection / Low-rate attack / behavior-based / normal behavior mode |
Paper # | ICSS2011-45 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2012/3/9(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Behavior-based Detection Method for Outbreaks of Low-rate Attacks |
Sub Title (in English) | |
Keyword(1) | Anomaly detection |
Keyword(2) | Low-rate attack |
Keyword(3) | behavior-based |
Keyword(4) | normal behavior mode |
1st Author's Name | Yaokai FENG |
1st Author's Affiliation | Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT)() |
2nd Author's Name | Yoshiaki HORI |
2nd Author's Affiliation | Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT) |
3rd Author's Name | Kouichi SAKURAI |
3rd Author's Affiliation | Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT) |
4th Author's Name | Jun'ichi TAKEUCHI |
4th Author's Affiliation | Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT) |
Date | 2012-03-16 |
Paper # | ICSS2011-45 |
Volume (vol) | vol.111 |
Number (no) | 495 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |