Compiling network traffic into rules using soft computing methods for the detection of flooding attacks

被引:9
作者
Noh, Sanguk [1 ]
Jung, Gihyun [2 ]
Choi, Kyunghee [3 ]
Lee, Cheolho [4 ]
机构
[1] Catholic Univ Korea, Sch Comp Sci & Informat Engn, Puchon, South Korea
[2] Ajou Univ, Div Elect Engn, Suwon 441749, South Korea
[3] Ajou Univ, Grad Sch Informat & Commun, Suwon 441749, South Korea
[4] Natl Secur Res Inst, Taejon, South Korea
关键词
network traffic modeling; soft computing; compiled rules; intrusion detection; flooding attacks;
D O I
10.1016/j.asoc.2007.02.016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The ability to dynamically collect and analyze network traffic and to accurately report the current network status is critical in the face of large-scale intrusions, and enables networks to continually function despite of traffic fluctuations. The paper presents a network traffic model that represents a specific network pattern and a methodology that compiles the network traffic into a set of rules using soft computing methods. This methodology based upon the network traffic model can be used to detect large-scale flooding attacks, for example, a distributed denial-of-service (DDoS) attack. We report experimental results that demonstrate the distinctive and predictive patterns of flooding attacks in simulated network settings, and show the potential of soft computing methods for the successful detection of large-scale flooding attacks. (C) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:1200 / 1210
页数:11
相关论文
共 31 条
[1]  
[Anonymous], 2001, MANAGING THREAT DENI
[2]  
[Anonymous], 1991, FIA9012701 NASA AM R
[3]  
*BINDVIEWS RAZOR S, 2001, ZOMB ZAPP
[4]  
Clark P., 1989, Machine Learning, V3, P261, DOI 10.1023/A:1022641700528
[5]  
DITTRICH D, 2006, DISTR DEN SERV DDOS
[6]   Extracting rules from trained neural network using GA for managing e-business [J].
Elalfi, AE ;
Haque, R ;
Elalami, ME .
APPLIED SOFT COMPUTING, 2004, 4 (01) :65-77
[7]   Denial-of-service attacks rip the Internet [J].
Garber, L .
COMPUTER, 2000, 33 (04) :12-17
[8]  
GIL TM, 2000, P 10 USENIX SEC S, P23
[9]  
HOLDER L, ML V2 0 MACH LEARN P
[10]  
HOULE K, 2001, CERT COORD CTR WHIT