Review over Anomaly Detection algorithms for detecting SYN flooding attacks

Shaikh, Riaz A. ORCID: https://orcid.org/0000-0001-6666-0253, Iqbal, Ahmad Ali and Samad, Kashan (2005) Review over Anomaly Detection algorithms for detecting SYN flooding attacks. In: 2005 Student Conference on Engineering Sciences and Technology, SCONEST. 2005 Student Conference on Engineering Sciences and Technology, SCONEST . UNSPECIFIED, PAK. ISBN 0780394429

Full text not available from this repository. (Request a copy)

Abstract

Network Anomalies usually refer to the conditions when network operations diverge from the normal behavior. Anomaly Detection in an IP network is a very complex task, because it is dependent upon the nature of the data that is available for the analysis. In this paper we have given the overview of two statistical based anomaly detection algorithms that are adaptive threshold algorithm and cumulative SUM algorithm especially with respect to the anomaly that is occurred due to SYN Flooding attacks. In the case of high intensity SYN Flooding attacks both were good and have less false alarm ratio where as in the case of low intensity attacks Adaptive threshold algorithm performance degrade and shows high false alarm where as in the case of cumulative sum algorithm its performance remain same with lesser false alarm ratio.

Item Type: Book Section
Uncontrolled Keywords: adaptive threshold cumulative sum,anomaly detection,syn flooding,computer science(all),computer science applications ,/dk/atira/pure/subjectarea/asjc/1700
Faculty \ School: Faculty of Science > School of Computing Sciences
UEA Research Groups: Faculty of Science > Research Groups > Cyber Security Privacy and Trust Laboratory
Related URLs:
Depositing User: LivePure Connector
Date Deposited: 16 Aug 2022 15:31
Last Modified: 07 May 2023 06:30
URI: https://ueaeprints.uea.ac.uk/id/eprint/87314
DOI: 10.1109/SCONEST.2005.4382870

Actions (login required)

View Item View Item