Abstract—This paper deals with the detection of flooding attacks which are the most common type of Denial of Service (DoS) attacks. We compare 2 divergence measures (Hellinger distance and Chi-square divergence) to analyze their detection accuracy. The performance of these statistical divergence mea-sures are investigated in terms of true positive and false alarm ratio. A particular focus will be on how to use these measures over Sketch data structure, and which measure provides the best detection accuracy. We conduct performance analysis over publicly available real IP traces (MAWI) collected from the WIDE backbone network. Our experimental results show that Chi-square divergence outperforms Hellinger distance in network anomalies detectio...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
The number and impact of attack over the Internet have been continuously increasing in the last year...
The number and impact of attack over the Internet have been continuously increasing in the last year...
International audienceThis paper deals with the detection of flooding attacks which are the most com...
ABSTRACT This paper deals with detection of SYN flooding attacks which are the most common type of ...
This paper deals with detection of SYN flooding attacks which are the most common type of attacks in...
Abstract—Anomaly detection in high speed networks is well known to be a challenging problem. It requ...
Flooding attacks detection in traffic of backbone networks requires generally the analysis of a huge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
Abstract — We present ‘D-CAD, ’ a novel divergence-measure based classification method for anomaly d...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
The number and impact of attack over the Internet have been continuously increasing in the last year...
The number and impact of attack over the Internet have been continuously increasing in the last year...
International audienceThis paper deals with the detection of flooding attacks which are the most com...
ABSTRACT This paper deals with detection of SYN flooding attacks which are the most common type of ...
This paper deals with detection of SYN flooding attacks which are the most common type of attacks in...
Abstract—Anomaly detection in high speed networks is well known to be a challenging problem. It requ...
Flooding attacks detection in traffic of backbone networks requires generally the analysis of a huge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
Abstract — We present ‘D-CAD, ’ a novel divergence-measure based classification method for anomaly d...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
This work in progress outlines a comparison of anomaly detection methods that we are undertaking. We...
The number and impact of attack over the Internet have been continuously increasing in the last year...
The number and impact of attack over the Internet have been continuously increasing in the last year...