Denial of service attacks constitute one of the greatest problem in network security. Monitoring traffic is one of the main techniques used in order to find out the existence of possible outliers in the traffic patterns. In this paper, we propose an approach that detects denial of service attacks using emergent self-organizing maps. The approach is based on classifying "normal" traffic against "abnormal" traffic in the sense of denial of service attacks. The approach permits the automatic classification of events that are contained in logs and visualization of network traffic. Extensive simulations show the effectiveness of this approach compared to previously proposed approaches regarding false alarms and detection probabilitie
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
Denial-of-Service attack is an attempt to make network resources or machine unavailable to its inten...
Abstract- A distributed denial-of-service (DDoS) attack is one in which a large number of compromise...
Abstract- Denial of Service attacks constitute one of the greatest problem in network security. Moni...
In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Koho...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
NoTraffic anomalies caused by Distributed Denial-of-Service (DDoS) attacks are major threats to both...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resou...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Abstract. The unsupervised detection of network attacks represents an extremely challenging goal. Cu...
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
Denial-of-Service attack is an attempt to make network resources or machine unavailable to its inten...
Abstract- A distributed denial-of-service (DDoS) attack is one in which a large number of compromise...
Abstract- Denial of Service attacks constitute one of the greatest problem in network security. Moni...
In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) based on Koho...
Abstract. In this paper, we analyze the potential of using Emergent Self-Organizing Maps (ESOMs) bas...
NoTraffic anomalies caused by Distributed Denial-of-Service (DDoS) attacks are major threats to both...
The continuous evolution of the attacks against computer networks has given renewed strength to rese...
Various Denial of Service (DoS) attacks are common phenomena in the Internet. They can consume resou...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
Model-based intrusion detection and knowledge discovery are combined to cluster and classify P2P bot...
The aim of this thesis was to develop a practically applicable set of methods for classification and...
Denial of service (DoS) attack is among the most significant types of attacks in cyber security. The...
The growth of the Internet and consequently, the number of interconnected computers through a shared...
Abstract. The unsupervised detection of network attacks represents an extremely challenging goal. Cu...
International audienceThe unsupervised detection of network attacks represents an extremely challeng...
Denial-of-Service attack is an attempt to make network resources or machine unavailable to its inten...
Abstract- A distributed denial-of-service (DDoS) attack is one in which a large number of compromise...