Skip to main content

An Attack Classification Tool Based On Traffic Properties and Machine Learning

  • Conference paper
  • First Online:
Novel Algorithms and Techniques in Telecommunications and Networking

Abstract

This work proposes an attack traffic identification based on traffic properties and machine learning. Attack identification is of great importance to many areas such as: intrusion detection, security, quality of service and the development of new hardware tools related to security. For the identification of each kind of attack, statistical discriminators were used based on their power of classification. The results obtained through this technique are presented in this work.

* This work is supported by CNPq

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. S. M. Specht, “Distributed Denial of Service: Taxonomies of attacks, tools and countermeasures”, International conference on parallel and distributed computing systems, PP. 543–550, September 2004.

    Google Scholar 

  2. C. L Schuba, I. V. Krsul, M. G. Kuhn, “Analysis of Denial of Service Attack on TCP”, IEEE Computer Society, Washington, DC, USA, 1997.

    Google Scholar 

  3. C. B. Lee, C. Roedel, E. Silenok, “Detection and Characterization of Port Scan Attacks”, Department of Computer Science & Engineering University of California, San Diego.

    Google Scholar 

  4. A. W. Moore, D. Zuev, M. Crogan, “Discriminators for use in flow-based classification”, In passive & Measurement workshop 2003 (PAM2005), August 2005.

    Google Scholar 

  5. P. Barford, J. Kline, D. Plonka, A. Ron, “A signal analysis of network traffic anomalies”, Internet Measurement Workshop 2002.

    Google Scholar 

  6. Brutlag, J., “Aberrant behavior detection in timeseries for network monitoring”, USENIX LISA 2000.

    Google Scholar 

  7. R. Holanda Filho, J. E. B. Maia, M. F. F. Carmo, , Paulino, G., “An Internet Traffic Classification Methodology based on Statistical Discriminators”, In: IEEE/IFIP Network Operations & Management Symposium, 2008, Salvador, Bahia. Anais do NOMS 2008, 2008.

    Google Scholar 

  8. J. Kurose, K. Ross, Redes de computadores e a Internet: Uma abordagem top-down, Pearson Addison Wesley, 2006.

    Google Scholar 

  9. B. Pinkas, T. Sander, “Securing Passwords against dictionary attack”, ACM conference on computer and communications security, pp. 161–170, 2002.

    Google Scholar 

  10. C. W. Kirkwood, “Decision Tree primer”, Department of Supply Chain Management, Arizona State University Tempe, AZ 85287–4706.

    Google Scholar 

  11. Y. Wang, I. H. Witten, “Induction of model trees for predicting continuous classes”, Poster papers of the 9th European Conference on Machine Learning, 1997.

    Google Scholar 

  12. T. Kalganova, “Towards the development of a Problem Solver for the Monitoring and Control of Instrumentation in a Grid Enviroment”, School of Engineering and Design Brunel University, 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Victor Pasknel de Alencar Ribeiro or Raimir Holanda Filho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media B.V.

About this paper

Cite this paper

de Alencar Ribeiro, V.P., Filho, R.H. (2010). An Attack Classification Tool Based On Traffic Properties and Machine Learning. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_54

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-3662-9_54

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-3661-2

  • Online ISBN: 978-90-481-3662-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics