{"title":"Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace","authors":"Masaki Narita, T. Katoh, B. B. Bista, T. Takata","doi":"10.1109/WAINA.2011.52","DOIUrl":null,"url":null,"abstract":"Damage caused by DoS attacks is serious and financial losses have become social problems in recent years. Any computers connected to the Internet have a possibility to be a victim at any time. Therefore, it is important for network administrators to develop means to comprehend the latest trend of DoS attacks. In our previous work, we proposed a distributed detecting method for the SYN Flood attack, which is one of the DoS attacks. In this paper, we evaluate our method using a real Internet trace which reflects the trends in SYN Flood attacks on the Internet. We show the applicability of our method to the Internet with prospective evaluation results.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"142 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAINA.2011.52","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Damage caused by DoS attacks is serious and financial losses have become social problems in recent years. Any computers connected to the Internet have a possibility to be a victim at any time. Therefore, it is important for network administrators to develop means to comprehend the latest trend of DoS attacks. In our previous work, we proposed a distributed detecting method for the SYN Flood attack, which is one of the DoS attacks. In this paper, we evaluate our method using a real Internet trace which reflects the trends in SYN Flood attacks on the Internet. We show the applicability of our method to the Internet with prospective evaluation results.