首页> 外文会议>Future Mobile Radio Trunking and Data Systems >A summary of detection of denial-of-QoS attacks on DiffServ networks
【24h】

A summary of detection of denial-of-QoS attacks on DiffServ networks

机译:在DiffServ网络上检测拒绝QoS攻击的摘要

获取原文
获取原文并翻译 | 示例

摘要

This paper summarizes our approach of detecting denial of QoS attacks on DiffServ networks. Our approach focuses on online quick detection, scalability to large networks, and a low false alarm generation rate. Sensors sample QoS metric at strategic points and we detect anomalies in sampled network flow statistics using the χ2 and EWMA Control Chart test methods. We also use rule-based intrusion detection of SLA as a complement to these techniques. We have tested our intrusion detection approach using emulation on a testbed, and using simulation. Attacks are detected 100% of the time, and require from under a minute to approximately 15 minutes to detect. The false alarm rate at the sensitivity level used to achieve these detection results is less than 1%. These results make our work a strong candidate for deployment.
机译:本文总结了我们在DiffServ网络上检测拒绝QoS攻击的方法。我们的方法侧重于在线快速检测,对大型网络的可伸缩性以及较低的虚假警报生成率。传感器在战略要点采样QoS指标,我们使用χ 2 和EWMA控制图测试方法检测采样网络流量统计信息中的异常。我们还使用基于规则的SLA入侵检测作为对这些技术的补充。我们已经在测试台上使用仿真和仿真对入侵检测方法进行了测试。在100%的时间内检测到攻击,并且需要一分钟到大约15分钟的时间才能检测到攻击。用于实现这些检测结果的灵敏度级别的误报率小于1%。这些结果使我们的工作成为部署的理想选择。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号