The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heterogeneous Wireless and Wired Networks (PM2HW2N 12)Flooding attacks detection in traffic of backbone networks requires generally the analysis of a huge amount of data with high accuracy and low complexity. In this paper, we propose a new scheme to detect flooding attacks in high speed networks. The proposed mechanism is based on the application of Power Divergence measures over Sketch data structure. Sketch is used for random aggregation of traffic, and Power Divergence is applied to detect deviations between currentand established probability distributions of network traffic. We focus on tuning the parameter of Power Divergence to optimize the pe...
Abstract—This paper deals with the detection of flooding attacks which are the most common type of D...
YesWith the rapid growth of security threats in computer networks, the need for developing efficient...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
Flooding attacks detection in traffic of backbone networks requires generally the analysis of a huge...
International audienceThis paper deals with the detection of flooding attacks which are the most com...
Abstract—Anomaly detection in high speed networks is well known to be a challenging problem. It requ...
ABSTRACT This paper deals with detection of SYN flooding attacks which are the most common type of ...
This paper deals with detection of SYN flooding attacks which are the most common type of attacks in...
Abstract—With the rapid dependency on the internet for business, and the fast spread of powerful des...
International audienceWith the rapid dependency on the internet for business, and the fast spread of...
Abstract—This paper deals with the detection of flooding attacks which are the most common type of D...
YesWith the rapid growth of security threats in computer networks, the need for developing efficient...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
The 7th ACM International Workshop on Performance Monitoring, Measurement and Evaluation of Heteroge...
Flooding attacks detection in traffic of backbone networks requires generally the analysis of a huge...
International audienceThis paper deals with the detection of flooding attacks which are the most com...
Abstract—Anomaly detection in high speed networks is well known to be a challenging problem. It requ...
ABSTRACT This paper deals with detection of SYN flooding attacks which are the most common type of ...
This paper deals with detection of SYN flooding attacks which are the most common type of attacks in...
Abstract—With the rapid dependency on the internet for business, and the fast spread of powerful des...
International audienceWith the rapid dependency on the internet for business, and the fast spread of...
Abstract—This paper deals with the detection of flooding attacks which are the most common type of D...
YesWith the rapid growth of security threats in computer networks, the need for developing efficient...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...