Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
SYN flooding attacks are a common type of Distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in th...
Bin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean ...
In recent years, the threats and damages caused by active worms have become more and more serious. In order to reduce the loss caused by fastspreading active worms, an effective de...
— Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We present DempsterShafer’s Theory of Evidence (D-S) as the mathematical foundati...