ResearchSpace

Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks

Show simple item record

dc.contributor.author Mkuzangwe, Nenekazi NP
dc.contributor.author McDonald, Andre M
dc.contributor.author Nelwamondo, Fulufhelo V
dc.date.accessioned 2016-06-27T08:35:24Z
dc.date.available 2016-06-27T08:35:24Z
dc.date.issued 2015-08
dc.identifier.citation Mkuzangwe, N.N.P. McDonald, A. and Nelwamondo, F.V. 2015. Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks. In: 12th International Conference on Fuzzy Systems and Knowledge Discovery, 15-17 August 2015, Zhangjiajie, China en_US
dc.identifier.uri http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7382282&tag=1
dc.identifier.uri http://hdl.handle.net/10204/8565
dc.description 12th International Conference on Fuzzy Systems and Knowledge Discovery, 15-17 August 2015, Zhangjiajie, China. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. en_US
dc.description.abstract This work implements two anomaly detection algorithms for detecting Transmission Control Protocol Synchronized (TCP SYN) flooding attack. The two algorithms are an adaptive threshold algorithm and a cumulative sum (CUSUM) based algorithm. Furthermore, we fused the outcomes of the two algorithms using the logic OR operator at different thresholds of the two algorithms to obtain improved detection accuracy. Indeed, the results indicated that the OR operator performs better than the two algorithms in detecting SYN flooding attack and detection delay. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Workflow;16590
dc.subject TCP SYN Flooding attack en_US
dc.subject Anomaly detection algorithms en_US
dc.subject Detection probability en_US
dc.subject False alarm rate en_US
dc.subject Detection delay en_US
dc.title Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Mkuzangwe, N. N., McDonald, A., & Nelwamondo, F. V. (2015). Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks. IEEE. http://hdl.handle.net/10204/8565 en_ZA
dc.identifier.chicagocitation Mkuzangwe, Nenekazi NP, A McDonald, and Fulufhelo V Nelwamondo. "Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks." (2015): http://hdl.handle.net/10204/8565 en_ZA
dc.identifier.vancouvercitation Mkuzangwe NN, McDonald A, Nelwamondo FV, Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks; IEEE; 2015. http://hdl.handle.net/10204/8565 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Mkuzangwe, Nenekazi NP AU - McDonald, A AU - Nelwamondo, Fulufhelo V AB - This work implements two anomaly detection algorithms for detecting Transmission Control Protocol Synchronized (TCP SYN) flooding attack. The two algorithms are an adaptive threshold algorithm and a cumulative sum (CUSUM) based algorithm. Furthermore, we fused the outcomes of the two algorithms using the logic OR operator at different thresholds of the two algorithms to obtain improved detection accuracy. Indeed, the results indicated that the OR operator performs better than the two algorithms in detecting SYN flooding attack and detection delay. DA - 2015-08 DB - ResearchSpace DP - CSIR KW - TCP SYN Flooding attack KW - Anomaly detection algorithms KW - Detection probability KW - False alarm rate KW - Detection delay LK - https://researchspace.csir.co.za PY - 2015 T1 - Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks TI - Implementation of anomaly detection algorithms for detecting transmission control protocol synchronized flooding attacks UR - http://hdl.handle.net/10204/8565 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record