Modelling distributed network attacks with constraints
نویسندگان
چکیده
منابع مشابه
Modelling distributed network attacks with constraints
NeMODe is a declarative system for computer network intrusion detection, providing a declarative domain specific language for describing network intrusion signatures which can span several network packets, by stating constraints over network packets, describing relations between several packets in a declarative and expressive way. It provides several back-end detection mechanisms, all based on ...
متن کاملModeling Distributed Network Attacks with Constraints
In this work we demonstrate how to model and perform the detection of Distributed Network attacks using NeMODe, a declarative system for Computer Network Intrusion Detection which provides a declarative Domain Specific Language for describing computer network intrusion signatures which span several network packets by stating constraints over network packets, thus, describing relations between s...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملDistributed Learning Mechanism Against Flooding Network Attacks
Adaptive techniques based on machine learning and data mining are gaining relevance in selfmanagement and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of distributed flooding attacks and network abuses. We extend the framework proposed by Zhang and Parashar (2006) to cooperatively detect and react to abnormal behaviors before the tar...
متن کاملProduction Constraints Modelling: A Tactical Review Approach
A constraint is a limitation or a restriction that poses a threat to the performance and efficiency of a system. This paper presented a tactical review approach to production constraints modeling. It discussed the theory of constraints (TOC) as a thinking process and continuous improvement strategy to curtail constraints in other to constantly increase the performance and efficiency of a system...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Bio-Inspired Computation
سال: 2013
ISSN: 1758-0366,1758-0374
DOI: 10.1504/ijbic.2013.055449