Reference Hub1
Classification of DOS Attacks Using Visualization Technique

Classification of DOS Attacks Using Visualization Technique

Mohamed Cheikh, Salima Hacini, Zizette Boufaida
Copyright: © 2014 |Volume: 8 |Issue: 2 |Pages: 14
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466655003|DOI: 10.4018/IJISP.2014040102
Cite Article Cite Article

MLA

Cheikh, Mohamed, et al. "Classification of DOS Attacks Using Visualization Technique." IJISP vol.8, no.2 2014: pp.19-32. http://doi.org/10.4018/IJISP.2014040102

APA

Cheikh, M., Hacini, S., & Boufaida, Z. (2014). Classification of DOS Attacks Using Visualization Technique. International Journal of Information Security and Privacy (IJISP), 8(2), 19-32. http://doi.org/10.4018/IJISP.2014040102

Chicago

Cheikh, Mohamed, Salima Hacini, and Zizette Boufaida. "Classification of DOS Attacks Using Visualization Technique," International Journal of Information Security and Privacy (IJISP) 8, no.2: 19-32. http://doi.org/10.4018/IJISP.2014040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. In this paper, a new technique for detecting DoS attacks is proposed; it detects DOS attacks using a set of classifiers and visualizes them in real time. This technique is based on the collection of network parameter values (data packets) which are automatically represented by simple geometric graphs form in order to highlight relevant elements. The effectiveness of the proposed technique has been proven through a MATLAB simulation of network traffic drawn from the 10% KDD, and a comparison with other classification techniques for intrusion detection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.