ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 An In-Depth Analysis on Traffic Flooding Attacks Detection and System using Data Mining Techniques
Cited 41 time in scopus Download 13 time Share share facebook twitter linkedin kakaostory
저자
유재학, 강현중, 박대헌, 방효찬, 강도욱
발행일
201311
출처
Journal of Systems Architecture, v.59 no.10 Part B, pp.1005-1012
ISSN
1383-7621
출판사
Elsevier
DOI
https://dx.doi.org/10.1016/j.sysarc.2013.08.008
협약과제
13ZC1100, 지능형 상황인지 및 IOT 기반 기술개발, 함호상
초록
Recently, as network traffic flooding attack such as DoS and DDoS have posed devastating threats on network services, rapid detection, and semantic analysis are the major concern for secure and reliable network services. In addition, in a recent issue of the safety and comfort of vehicles and communication technologies for service is required. We propose a traffic flooding attack detection and an in-depth analysis system that uses data mining techniques. In this paper we (1) designed and implemented a system that detects traffic flooding attacks. Then, it executes classification by attack type and it uses SNMP MIB information based on C4.5 algorithm; (2) conducted a semantic interpretation that extracts and analyzes the rules of execution mechanism that are additionally provided by C4.5; (3) performed an in-depth analysis on the attack patterns and useful knowledge inherent in their data by type, utilizing association rule mining. Classification by attack and attack type based on C4.5 and association rules, automatic rule extraction and semantic in-depth interpretation, which are proposed in this paper, provide a positive possibility to add momentum towards the development of new methodologies for intrusion detection systems as well as to support establishing policies for intrusion detection and response systems. © 2013 Elsevier B.V. All rights reserved.
KSP 제안 키워드
Association rule mining, Attack Detection, Attacks detection, C4.5 Algorithm, Data mining(DM), Depth interpretation, Execution mechanism, Flooding attack, In-depth analysis, Intrusion Detection Systems(IDSs), Intrusion detection system(IDS)