Detection and identification of neptune attacks and flash crowds

Quyen Le The*, Marat Zhanikeev, Yoshiaki Tanaka

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Neptune attack and Flash Crowd are two typical threats to web servers. These two anomalies have many identical features that make them difficult to distinguish. In this paper, we propose a statistical packet-based method to detect Neptune attacks and Flash Crowds and more importantly, by performing separate analysis by source address aggregation, we also propose additional efficient means to differentiate these two similar anomalies.

Original languageEnglish
Title of host publicationManaging Next Generation Networks and Services - 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Proceedings
Pages571-574
Number of pages4
Publication statusPublished - 2007 Dec 1
Event10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007 - Sapporo, Japan
Duration: 2007 Oct 102007 Oct 12

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4773 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007
Country/TerritoryJapan
CitySapporo
Period07/10/1007/10/12

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Detection and identification of neptune attacks and flash crowds'. Together they form a unique fingerprint.

Cite this