• DocumentCode
    401819
  • Title

    Distributed port recall (DPR) attacks and its detection

  • Author

    Jia, Wen-li ; Xue, Qiang ; Sun, Ji-zhou

  • Author_Institution
    Dept. of Comput. Sci., Tianjin Univ., China
  • Volume
    4
  • fYear
    2003
  • fDate
    2-5 Nov. 2003
  • Firstpage
    2346
  • Abstract
    Based on the analysis of DDos attacks in communication and the study of the popular port recall techniques, we found that the harm is more serious when combining them to form a new kind of attacks. A model called distributed port recall attacks is presented in this paper to describe this combination, and some misuse intrusion detection methods based on the records of connections (sessions) and anomaly intrusion detection methods based on the behaviors of users are also proposed. The detection schemes can detect DPR attacks effectively.
  • Keywords
    computer networks; data mining; safety systems; telecommunication security; anomaly intrusion detection methods; distributed port recall attacks; misuse intrusion detection methods; records of connections; Bandwidth; Central Processing Unit; Computer crime; Computer hacking; Computer networks; Computer science; Intrusion detection; Law; Legal factors; Sun;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Machine Learning and Cybernetics, 2003 International Conference on
  • Print_ISBN
    0-7803-8131-9
  • Type

    conf

  • DOI
    10.1109/ICMLC.2003.1259901
  • Filename
    1259901