dc.contributor.author |
Mkuzangwe, Nenekazi NP
|
|
dc.contributor.author |
McDonald, Andre M
|
|
dc.contributor.author |
Nelwamondo, Fulufhelo V
|
|
dc.date.accessioned |
2016-06-27T08:35:24Z |
|
dc.date.available |
2016-06-27T08:35:24Z |
|
dc.date.issued |
2015-08 |
|
dc.identifier.citation |
Mkuzangwe, N.N.P. McDonald, A. and Nelwamondo, F.V. 2015. Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks. In: 12th International Conference on Fuzzy Systems and Knowledge Discovery, 15-17 August 2015, Zhangjiajie, China |
en_US |
dc.identifier.uri |
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7382282&tag=1
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/8565
|
|
dc.description |
12th International Conference on Fuzzy Systems and Knowledge Discovery, 15-17 August 2015, Zhangjiajie, China. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. |
en_US |
dc.description.abstract |
This work implements two anomaly detection algorithms for detecting Transmission Control Protocol Synchronized (TCP SYN) flooding attack. The two algorithms are an adaptive threshold algorithm and a cumulative sum (CUSUM) based algorithm. Furthermore, we fused the outcomes of the two algorithms using the logic OR operator at different thresholds of the two algorithms to obtain improved detection accuracy. Indeed, the results indicated that the OR operator performs better than the two algorithms in detecting SYN flooding attack and detection delay. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.relation.ispartofseries |
Workflow;16590 |
|
dc.subject |
TCP SYN Flooding attack |
en_US |
dc.subject |
Anomaly detection algorithms |
en_US |
dc.subject |
Detection probability |
en_US |
dc.subject |
False alarm rate |
en_US |
dc.subject |
Detection delay |
en_US |
dc.title |
Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Mkuzangwe, N. N., McDonald, A., & Nelwamondo, F. V. (2015). Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks. IEEE. http://hdl.handle.net/10204/8565 |
en_ZA |
dc.identifier.chicagocitation |
Mkuzangwe, Nenekazi NP, A McDonald, and Fulufhelo V Nelwamondo. "Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks." (2015): http://hdl.handle.net/10204/8565 |
en_ZA |
dc.identifier.vancouvercitation |
Mkuzangwe NN, McDonald A, Nelwamondo FV, Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks; IEEE; 2015. http://hdl.handle.net/10204/8565 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Mkuzangwe, Nenekazi NP
AU - McDonald, A
AU - Nelwamondo, Fulufhelo V
AB - This work implements two anomaly detection algorithms for detecting Transmission Control Protocol Synchronized (TCP SYN) flooding attack. The two algorithms are an adaptive threshold algorithm and a cumulative sum (CUSUM) based algorithm. Furthermore, we fused the outcomes of the two algorithms using the logic OR operator at different thresholds of the two algorithms to obtain improved detection accuracy. Indeed, the results indicated that the OR operator performs better than the two algorithms in detecting SYN flooding attack and detection delay.
DA - 2015-08
DB - ResearchSpace
DP - CSIR
KW - TCP SYN Flooding attack
KW - Anomaly detection algorithms
KW - Detection probability
KW - False alarm rate
KW - Detection delay
LK - https://researchspace.csir.co.za
PY - 2015
T1 - Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks
TI - Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks
UR - http://hdl.handle.net/10204/8565
ER - |
en_ZA |