Defending against Null Calls Stream Attacks by using a double-threshold dynamic filter

被引:0
|
作者
Xu, HZ [1 ]
Cui, CW [1 ]
Lin, Y [1 ]
Luo, TJ [1 ]
Dong, ZQ [1 ]
机构
[1] USTC, Grad Sch, Beijing 100039, Peoples R China
关键词
ATM; NCSA attack; double-threshold filter;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, A NCSA (Null Calls Stream Attack) attack that can happen in ATM control plane is pointed out. After analyzing its characteristics, a risk-cost-based solution - double-threshold dynamic filter - is brought forward. The analytical expression and algorithm of the threshold setting are also given. By; implementing the algorithm on;ATM access equipments, the NCSA attack can be blocked effectively. Finally, the solution is validated in a simulated environment.
引用
收藏
页码:261 / 270
页数:4
相关论文
共 50 条
  • [1] Segmentation of Heart Sound Using Double-threshold
    Chen Jie
    Hou Hailiang
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2013), 2013, : 985 - 988
  • [2] Defending Against Adversarial Attacks via Neural Dynamic System
    Li, Xiyuan
    Zou, Xin
    Liu, Weiwei
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35, NEURIPS 2022, 2022,
  • [3] A dynamic double-threshold cooperative energy detection algorithm for cognitive radio systems
    Wu, Jinbo
    Luo, Tao
    Lin, Fei
    Yue, Guangxin
    [J]. Gaojishu Tongxin/Chinese High Technology Letters, 2010, 20 (06): : 558 - 564
  • [4] Defending Against Adversarial Attacks Using Random Forest
    Ding, Yifan
    Wang, Liqiang
    Zhang, Huan
    Yi, Jinfeng
    Fan, Deliang
    Gong, Boqing
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2019), 2019, : 105 - 114
  • [5] Resource Network with Limitations on Vertex Capacities: A Double-Threshold Dynamic Flow Model
    Zhilyakova, Liudmila Yu.
    [J]. ARTIFICIAL INTELLIGENCE (RCAI 2018), 2018, 934 : 240 - 248
  • [6] SHADOW DETECTION USING DOUBLE-THRESHOLD PULSE COUPLED NEURAL NETWORKS
    Ji, Jing
    Jiang, Xudong
    Sun, Wei
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 1971 - 1975
  • [7] SPECTRE Defending Against Backdoor Attacks Using Robust Statistics
    Hayase, Jonathan
    Kong, Weihao
    Somani, Raghav
    Oh, Sewoong
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139
  • [8] Defending against low-rate TCP attacks: Dynamic detection and protection
    Sun, HB
    Lui, JCS
    Yau, DKY
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 2004, : 196 - 205
  • [9] A Sequential Cooperative Spectrum Sensing Algorithm Based on Dynamic Adaptive Double-threshold Energy Detection
    Huang He
    Yuan Chaowei
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (05) : 1037 - 1043
  • [10] Adversaries Strike Hard: Adversarial Attacks Against Malware Classifiers Using Dynamic API Calls as Features
    Hariom
    Handa, Anand
    Kumar, Nitesh
    Shukla, Sandeep Kumar
    [J]. CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, 2021, 12716 : 20 - 37