On Scalable Attack Detection in the Network
#1

On Scalable Attack Detection in the Network
Ramana Rao Kompella, Student Member, IEEE, Sumeet Singh, and George Varghese, Member, IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 1

Abstract—
Current intrusion detection and prevention systemsseek to detect a wide class of network intrusions (e.g., DoS attacks,worms, port scans) at network vantage points. Unfortunately,
even today, many IDS systems we know of keep per-connectionor per-flow state to detect malicious TCP flows. Thus, it is hardlysurprising that these IDS systems have not scaled to multi-gigabit
speeds. By contrast, both router lookups and fair queuing havescaled to high speeds using aggregation via prefix lookups orDiffServ. Thus, in this paper, we initiate research into the question
as to whether one can detect attacks without keeping per-flowstate. We will show that such aggregation, while making fast implementationspossible, immediately causes two problems. First,
aggregation can cause behavioral aliasing where, for example,good behaviors can aggregate to look like bad behaviors. Second,aggregated schemes are susceptible to spoofing by which the
intruder sends attacks that have appropriate aggregate behavior.We examine a wide variety of DoS and scanning attacks andshow that several categories (bandwidth based, claim-and-hold,
port-scanning) can be scalably detected. In addition to existingapproaches for scalable attack detection, we propose a novel datastructure called partial completion filters (PCFs) that can detect
claim-and-hold attacks scalably in the network. We analyze PCFsboth analytically and using experiments on real network traces todemonstrate how we can tune PCFs to achieve extremely low falsepositive and false negative probabilities.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: report for seminar on jamming attack on mobaile network, on scalable attack detection in the network, jellyfish attack in ad hoc network, ppt on whormhole attack wireless sensor network,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network attached storage computer science crazy 3 12,534 20-02-2019, 01:16 PM
Last Post:
  network security seminars report computer science technology 14 20,494 24-11-2018, 01:19 AM
Last Post:
  OBJECT TRACKING AND DETECTION full report project topics 9 30,868 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,383 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,097 15-04-2016, 08:04 PM
Last Post: knagpur
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,348 10-02-2015, 05:52 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,915 30-03-2014, 04:40 AM
Last Post: Guest
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,349 22-07-2013, 11:44 AM
Last Post: computer topic
  Computerized Paper Evaluation using Neural Network computer science crazy 12 17,845 17-07-2013, 04:08 PM
Last Post: Guest

Forum Jump: