Flooding attacks detection in traffic of backbone networks

O Salem, A Makke, J Tajer… - 2011 IEEE 36th …, 2011 - ieeexplore.ieee.org
Internet services are vulnerable to flooding attacks that lead to denial of service. This paper
proposes a new framework to detect anomalies and to provide early alerts for flooding …

Flooding attacks detection in backbone traffic using power divergence

A Makke, O Salem, M Assaad, H Moungla… - Proceedings of the 7th …, 2012 - dl.acm.org
Flooding attacks detection in traffic of backbone networks requires generally the analysis of
a huge amount of data with high accuracy and low complexity. In this paper, we propose a …

Flooding attacks detection and victim identification over high speed networks

O Salem, A Mehaoua, S Vaton… - 2009 Global Information …, 2009 - ieeexplore.ieee.org
With the rapid dependency on the Internet for business, and the fast spread of powerful
destructive DoS/DDoS attack tools, the detection and thwarting of these attacks is primordial …

[PDF][PDF] Detecting distributed attacks using network-wide flow traffic

A Lakhina, M Crovella, C Diot - Proceedings of FloCon 2005 Analysis …, 2005 - cs.bu.edu
Distributed denial of service attacks have become both prevalent and sophisticated. Botnet-
driven attacks can be launched from thousands of worm-infected and compromised …

A comparison between divergence measures for network anomaly detection

J Tajer, A Makke, O Salem… - 2011 7th International …, 2011 - ieeexplore.ieee.org
This paper deals with the detection of flooding attacks which are the most common type of
Denial of Service (DoS) attacks. We compare 2 divergence measures (Hellinger distance …

Invited talk: Sketch based anomaly detection, identification and performance evaluation

P Abry, P Borgnat, G Dewaele - 2007 International Symposium …, 2007 - ieeexplore.ieee.org
An anomaly detection procedure is defined and its statistical performance are carefully
quantified. It is based on a non Gaussian modeling of the marginal distributions of random …

Detection of network buffer overflow attacks: A case study

B Maroš, I Homoliak, M Kacic… - 2013 47th International …, 2013 - ieeexplore.ieee.org
This paper presents an automated detection method based on classification of network
traffic using predefined set of network metrics. We proposed the set of metrics with focus on …

Detecting attacks in high-speed networks: Issues and solutions

A Gupta, LS Sharma - Information Security Journal: A Global …, 2020 - Taylor & Francis
Intrusion detection systems are one of the necessities of networks to identify the problem of
network attacks. Organizations striving to protect their data from intruders are often …

Fast target link flooding attack detection scheme by analyzing traceroute packets flow

T Hirayama, K Toyoda, I Sasase - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Recently, a botnet based DDoS (Distributed Denial of Service) attack, called target link
flooding attack, has been reported that cuts off specific links over the Internet and …

[PDF][PDF] Flow-based brute-force attack detection in large and high-speed networks

J Vykopal - Masaryk University (Brno, Czech Republic), PhD …, 2013 - is.muni.cz
Network-based intrusion detection is traditionally bound to deep packet inspection, ie
searching for known signatures of attacks in the packet payload. With the rise of connected …