Abstract
This work proposes an attack traffic identification based on traffic properties and machine learning. Attack identification is of great importance to many areas such as: intrusion detection, security, quality of service and the development of new hardware tools related to security. For the identification of each kind of attack, statistical discriminators were used based on their power of classification. The results obtained through this technique are presented in this work.
* This work is supported by CNPq
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Reference
S. M. Specht, “Distributed Denial of Service: Taxonomies of attacks, tools and countermeasures”, International conference on parallel and distributed computing systems, PP. 543–550, September 2004.
C. L Schuba, I. V. Krsul, M. G. Kuhn, “Analysis of Denial of Service Attack on TCP”, IEEE Computer Society, Washington, DC, USA, 1997.
C. B. Lee, C. Roedel, E. Silenok, “Detection and Characterization of Port Scan Attacks”, Department of Computer Science & Engineering University of California, San Diego.
A. W. Moore, D. Zuev, M. Crogan, “Discriminators for use in flow-based classification”, In passive & Measurement workshop 2003 (PAM2005), August 2005.
P. Barford, J. Kline, D. Plonka, A. Ron, “A signal analysis of network traffic anomalies”, Internet Measurement Workshop 2002.
Brutlag, J., “Aberrant behavior detection in timeseries for network monitoring”, USENIX LISA 2000.
R. Holanda Filho, J. E. B. Maia, M. F. F. Carmo, , Paulino, G., “An Internet Traffic Classification Methodology based on Statistical Discriminators”, In: IEEE/IFIP Network Operations & Management Symposium, 2008, Salvador, Bahia. Anais do NOMS 2008, 2008.
J. Kurose, K. Ross, Redes de computadores e a Internet: Uma abordagem top-down, Pearson Addison Wesley, 2006.
B. Pinkas, T. Sander, “Securing Passwords against dictionary attack”, ACM conference on computer and communications security, pp. 161–170, 2002.
C. W. Kirkwood, “Decision Tree primer”, Department of Supply Chain Management, Arizona State University Tempe, AZ 85287–4706.
Y. Wang, I. H. Witten, “Induction of model trees for predicting continuous classes”, Poster papers of the 9th European Conference on Machine Learning, 1997.
T. Kalganova, “Towards the development of a Problem Solver for the Monitoring and Control of Instrumentation in a Grid Enviroment”, School of Engineering and Design Brunel University, 2006.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
de Alencar Ribeiro, V.P., Filho, R.H. (2010). An Attack Classification Tool Based On Traffic Properties and Machine Learning. In: Sobh, T., Elleithy, K., Mahmood, A. (eds) Novel Algorithms and Techniques in Telecommunications and Networking. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3662-9_54
Download citation
DOI: https://doi.org/10.1007/978-90-481-3662-9_54
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3661-2
Online ISBN: 978-90-481-3662-9
eBook Packages: EngineeringEngineering (R0)