A behavior-based online engine for detecting distributed cyber-attacks

研究成果: 書籍/レポート タイプへの寄稿会議への寄与

2 被引用数 (Scopus)


Distributed attacks have reportedly caused the most serious losses in recent years. Here, distributed attacks means those attacks conducted collaboratively by multiple hosts. How to detect distributed attacks has become one of the most important topics in the cyber security community. Many detection methods have been proposed, each of which, however, has its own weak points. For example, detection performance of information theory based methods strongly depends on the information theoretic measures and signature-based methods suffer from the fact that they can deal with neither new kinds of attacks nor new variants of existing attacks. Recently, behavior-based method has been attracting great attentions from many researchers and developers and it is thought as the most promising one. In behavior-based approaches, normal behavior modes are learned/extracted from past traffic data of the monitored network and are used to recognize anomalies in the future detection. In this paper, we explain how to implement an online behavior-based engine for detecting distributed cyber-attacks. Detection cases of our engine are also introduced and some actual attacks/incidents have been captured by our detection engine.

ホスト出版物のタイトルInformation Security Applications - 17th International Workshop, WISA 2016, Revised Selected Papers
編集者Dooho Choi, Sylvain Guilley
出版社Springer Verlag
出版ステータス出版済み - 1月 1 2017
イベント17th International Workshop on Information Security Applications, WISA 2016 - Jeju Island, 韓国
継続期間: 8月 25 20168月 25 2016


名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
10144 LNCS


その他17th International Workshop on Information Security Applications, WISA 2016
City Jeju Island

All Science Journal Classification (ASJC) codes

  • 理論的コンピュータサイエンス
  • コンピュータ サイエンス(全般)


「A behavior-based online engine for detecting distributed cyber-attacks」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。