Modelling distributed network attacks with constraints

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modelling distributed network attacks with constraints

NeMODe is a declarative system for computer network intrusion detection, providing a declarative domain specific language for describing network intrusion signatures which can span several network packets, by stating constraints over network packets, describing relations between several packets in a declarative and expressive way. It provides several back-end detection mechanisms, all based on ...

متن کامل

Modeling Distributed Network Attacks with Constraints

In this work we demonstrate how to model and perform the detection of Distributed Network attacks using NeMODe, a declarative system for Computer Network Intrusion Detection which provides a declarative Domain Specific Language for describing computer network intrusion signatures which span several network packets by stating constraints over network packets, thus, describing relations between s...

متن کامل

Neural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks

Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...

متن کامل

Distributed Learning Mechanism Against Flooding Network Attacks

Adaptive techniques based on machine learning and data mining are gaining relevance in selfmanagement and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of distributed flooding attacks and network abuses. We extend the framework proposed by Zhang and Parashar (2006) to cooperatively detect and react to abnormal behaviors before the tar...

متن کامل

Production Constraints Modelling: A Tactical Review Approach

A constraint is a limitation or a restriction that poses a threat to the performance and efficiency of a system. This paper presented a tactical review approach to production constraints modeling. It discussed the theory of constraints (TOC) as a thinking process and continuous improvement strategy to curtail constraints in other to constantly increase the performance and efficiency of a system...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Bio-Inspired Computation

سال: 2013

ISSN: 1758-0366,1758-0374

DOI: 10.1504/ijbic.2013.055449