Denial-of-service attack-detection techniques

Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai

Research output: Contribution to journalArticle

232 Scopus citations

Abstract

Denial-of-service (DoS) detection techniques - such as activity profiling, changepoint detection, and wavelet - based signal analysis - face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques and testing results provides insight into our ability to successfully identify DoS flooding attacks. Although each detector shows promise in limited testing, none completely solve the detection problem. Combining various approaches with experienced network operators will most likely produce the best results.

Original languageEnglish (US)
Pages (from-to)82-89
Number of pages8
JournalIEEE Internet Computing
Volume10
Issue number1
DOIs
StatePublished - Jan 1 2006

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Denial-of-service attack-detection techniques'. Together they form a unique fingerprint.

  • Cite this