Abstract | ||
---|---|---|
Research on denial of service DoS attack detection is complicated due to scarcity of reliable, widely available and representative contemporary input data. Efficiency of newly proposed DoS detection methods is continually verified with obsolete attack samples and tools. To address this issue, we provide a comparative analysis of traffic features of DoS attacks that were generated by state-of-the-art standalone DoS attack tools. We provide a classification of different attack traffic features, including utilized evasion techniques and encountered anomalies. We also propose a new research direction for the detection of DoS attacks at the source end, based on repeated attack patterns recognition. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-24126-5_2 | SPACE |
Keywords | Field | DocType |
denial of service tools,input features,traffic characteristics | Attack patterns,Scarcity,Denial-of-service attack,Computer science,Computer security,Network security,Computer network | Conference |
Volume | ISSN | Citations |
9354 | 0302-9743 | 1 |
PageRank | References | Authors |
0.37 | 17 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Vit Bukac | 1 | 2 | 1.75 |
Vashek Matyas | 2 | 165 | 29.25 |