A proposal for detecting distributed cyber-attacks using automatic thresholding

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Distributed attacks have reportedly caused the most serious losses in the modern cyber environment. Thus, how to avoid and detect distributed attacks has become one of the most important topics in the cyber security community. Of many approaches for avoiding and detecting cyber-attacks, behavior based method has been attracting great attentions from many researchers and developers. It is well known that, for behavior based cyber-attack detections, the algorithm for extracting normal modes from historic traffic is critically important. In this paper, after the newest algorithms for extracting normal behavior mode from historic traffics are discussed, a novel algorithm is proposed. Its efficiency is examined by experiments using darknet traffic data.

Original languageEnglish
Title of host publicationProceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages152-159
Number of pages8
ISBN (Electronic)9781479919895
DOIs
Publication statusPublished - 2015
Event10th Asia Joint Conference on Information Security, AsiaJCIS 2015 - Kaohsiung City, Taiwan, Province of China
Duration: May 24 2015May 26 2015

Publication series

NameProceedings - 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015

Other

Other10th Asia Joint Conference on Information Security, AsiaJCIS 2015
Country/TerritoryTaiwan, Province of China
CityKaohsiung City
Period5/24/155/26/15

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A proposal for detecting distributed cyber-attacks using automatic thresholding'. Together they form a unique fingerprint.

Cite this