Decision analysis of network-based intrusion detection systems for denial-of-service attacks

被引:0
|
作者
Li, M [1 ]
Jia, WJ [1 ]
Zhao, W [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
关键词
detection; network security; denial-of-service attacks; self-similar traffic; pattern matching;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Two of practical issues in designing a network-based intrusion detection system for denial-of-service attacks are how to represent the distributions of detection probability, false alarm probability and miss probability; how to achieve a high detection probability, a low false alarm probability and a low miss probability for decision making. This paper gives the representations to describe three probability distributions. Based on them, the authors derive a detection region within which one may achieve a high detection probability, a low false alarm probability and a low miss probability by selecting a suitable threshold value. A case study is demonstrated.
引用
收藏
页码:E1 / E6
页数:6
相关论文
共 50 条
  • [1] CNN-Based Network Intrusion Detection against Denial-of-Service Attacks
    Kim, Jiyeon
    Kim, Jiwon
    Kim, Hyunjung
    Shim, Minsun
    Choi, Eunjung
    [J]. ELECTRONICS, 2020, 9 (06) : 1 - 21
  • [2] TCP based denial-of-service attacks to edge network: Analysis and detection
    Kumar, VA
    Sisalem, D
    [J]. INTELLIGENT INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, 3356 : 214 - 223
  • [3] Detection of Denial-of-service Attacks
    Anh Quang Tran
    [J]. 计算机工程, 2002, (S1) : 86 - 91
  • [4] Analysis of denial-of-service attacks on denial-of-service defensive measures
    Wang, BT
    Schulzrinne, H
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1339 - 1343
  • [5] Distributed denial-of-service and intrusion detection
    Zhou, Xiaobo
    Xu, Cheng-Zhong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 819 - 822
  • [6] Intrusion Detection Systems' Performance for Distributed Denial-of-Service Attack
    de Sousa Araujo, Tiago Emilio
    Matos, Fernando Menezes
    Moreira, Josilene Aires
    [J]. 2017 CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (CHILECON), 2017,
  • [7] Denial of service attacks on network-based control systems: Impact and mitigation
    Long, Men
    Wu, Chwan-Hwa
    Hung, John Y.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2005, 1 (02) : 85 - 96
  • [8] A denial-of-service resistant intrusion detection architecture
    Mell, P
    Marks, D
    McLarnon, M
    [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04): : 641 - 658
  • [9] Denial-of-service attacks
    Neumann, PG
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (04) : 136 - 136
  • [10] Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    Hu, Jiankun
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2519 - 2533