On the Estimation of Attacks in Computer Networks with an AR Approach
Abstract
Keywords
Full Text:
PDFReferences
S. Kent, “On the trial of intrusions into information systems,”IEEE Spectrum, Vol.37, Issue: 12, pp. 52–56, December 2000.
B. AsSadhan, H. Kim, J. Moura, and X. Wang, “Network Traffic Behavior Analysis by Decomposition into Control and Data Planes,.
http://en.wikipedia.org/wiki/Autoregressive_model.
G. Box, G. Jenkins, and G. Reinsel, Time Series Analysis, 3rd ed., Prentice Hall, 1994.
http://en.wikipedia.org/wiki/Cross-correlation.
Proc. International Workshop on Security in Systems and Networks (SSN) in conjunction with IEEE IPDPS, pp. 1 – 5, April 2008.
N. Ranjan, H. Murthy, T.Gonsalves, “Detection of Syn Flooding Attacks Using Generalized Autoregressive Conditional Heteroskedasticity(GARCH) Modeling Technique, ” in Proc. National Conference on Communication (NCC), pp. 1–5, Jan. 2010.
TCPDUMP/LIBPCAP public repository. [Online]. Available: http://www.tcpdump.org. Accessed June 2013.
B. AsSadhan, H. Kim, and J. M. F. Moura, “Long-range dependence analysis of controland data planes network traffic,” in Saudi International Innovation Conference (SIIC),Leeds, UK, Jun. 9-10, 2008
P. Brockwell and R. Davis, Time Series: Theory and Methods, 2nd ed. New York:Springer-Verlag, 1991.
E. Cole, R. L. Krutz, and J. Conley. Network Security Bible. John Wiley & Sons,Inc., New York, NY, USA, 2005.
D. Denning, “An Intrusion Detection Model,” IEEE Transactions on Software Engineering, 13, 2, 222-232, 1967.
Androulidakis, G., and Papavassiliou, S. Improving networkanomaly detection via selective flow-based sampling. Communications,IET 2, 3 (march 2008), 399 –409.
A. G. Lawrence, M. P. Loeb, W. Lucyshyn and R. Richardson, "2006 CSI/FBIcomputer crime and security survey," Computer Security Institute, San Francisco, CA,Tech. Rep. 11, 2006.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.