ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques
Cited 42 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Jaehak Yu, Hyunjoong Kang, DaeHeon Park, Hyo-Chan Bang, Do Wook Kang
Issue Date
2013-11
Citation
Journal of Systems Architecture, v.59, no.10 Part B, pp.1005-1012
ISSN
1383-7621
Publisher
Elsevier
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1016/j.sysarc.2013.08.008
Abstract
Recently, as network traffic flooding attack such as DoS and DDoS have posed devastating threats on network services, rapid detection, and semantic analysis are the major concern for secure and reliable network services. In addition, in a recent issue of the safety and comfort of vehicles and communication technologies for service is required. We propose a traffic flooding attack detection and an in-depth analysis system that uses data mining techniques. In this paper we (1) designed and implemented a system that detects traffic flooding attacks. Then, it executes classification by attack type and it uses SNMP MIB information based on C4.5 algorithm; (2) conducted a semantic interpretation that extracts and analyzes the rules of execution mechanism that are additionally provided by C4.5; (3) performed an in-depth analysis on the attack patterns and useful knowledge inherent in their data by type, utilizing association rule mining. Classification by attack and attack type based on C4.5 and association rules, automatic rule extraction and semantic in-depth interpretation, which are proposed in this paper, provide a positive possibility to add momentum towards the development of new methodologies for intrusion detection systems as well as to support establishing policies for intrusion detection and response systems. © 2013 Elsevier B.V. All rights reserved.
KSP Keywords
Association rule mining, Attack Detection, Attacks detection, C4.5 Algorithm, Data mining(DM), Depth interpretation, Detection Systems(IDS), Execution mechanism, In-depth analysis, Rapid detection, Rule extraction