Abstract. The quality of feature has significant impact on the perfor-mance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate characterization for network traffic records make the techniques suffer from low accuracy in detec-tion. Although researches have been conducted and attempted to over-come this problem, there are some constraints in these works. In this paper, we propose a technique based on Euclidean Distance Map (EDM) for optimal feature extraction. The proposed technique runs analysis on original feature space (first-order statistics) and extracts the multivari-ate correlations between the first-order statistics. The extracted multi-variate correlations, namely second-order...
Cloud computing plays an important role in current converged networks. It brings convenience of acce...
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unava...
© 2017 IEEE. This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anom...
The quality of feature has significant impact on the performance of detection techniques used for De...
The quality of feature has significant impact on the performance of detection techniques used for De...
The reliability and availability of network services are being threatened by the growing number of D...
In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate c...
Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, ar...
Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, ar...
In the age of information technology the facets of work and availability of everything on internet n...
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of det...
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of det...
Denial-of-Service attack is an attempt to make network resources or machine unavailable to its inten...
We present a attack detection system that utilizes Multivariate Correlation Analysis (MCA) for preci...
Cloud computing plays an important role in current converged networks. It brings convenience of acce...
Cloud computing plays an important role in current converged networks. It brings convenience of acce...
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unava...
© 2017 IEEE. This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anom...
The quality of feature has significant impact on the performance of detection techniques used for De...
The quality of feature has significant impact on the performance of detection techniques used for De...
The reliability and availability of network services are being threatened by the growing number of D...
In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate c...
Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, ar...
Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, ar...
In the age of information technology the facets of work and availability of everything on internet n...
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of det...
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of det...
Denial-of-Service attack is an attempt to make network resources or machine unavailable to its inten...
We present a attack detection system that utilizes Multivariate Correlation Analysis (MCA) for preci...
Cloud computing plays an important role in current converged networks. It brings convenience of acce...
Cloud computing plays an important role in current converged networks. It brings convenience of acce...
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unava...
© 2017 IEEE. This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anom...