This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Denial-of-Service Attack-Detection Techniques
January/February 2006 (vol. 10 no. 1)
pp. 82-89
Glenn Carl, Pennsylvania State University
George Kesidis, Pennsylvania State University
Richard R. Brooks, Clemson University
Suresh Rai, Louisiana State University
Denial-of-service (DoS) detection techniques--such as activity profiling, changepoint detection, and wavelet-based signal analysis--face the considerable challenge of discriminating network-based flooding attacks from sudden increases in legitimate activity or flash events. This survey of techniques and testing results provides insight into our ability to successfully identify DoS flooding attacks. Although each detector shows promise in limited testing, none completely solve the detection problem.Combining various approaches with experienced network operators will most likely produce the best results.
Index Terms:
denial-of-service, DoS, flooding attacks
Citation:
Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai, "Denial-of-Service Attack-Detection Techniques," IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, Jan.-Feb. 2006, doi:10.1109/MIC.2006.5
Usage of this product signifies your acceptance of the Terms of Use.