Rania A. Ghazy, El-Sayed M. El-Rabaie, M. Dessouky, N. El-Fishawy, F. E. El-Samie
{"title":"SYN Flood Attack Detection Usiing AR Model","authors":"Rania A. Ghazy, El-Sayed M. El-Rabaie, M. Dessouky, N. El-Fishawy, F. E. El-Samie","doi":"10.21608/mjeer.2019.62725","DOIUrl":null,"url":null,"abstract":"Due to the sophisticated characteristics of auto-regressive (AR) modeling approach, it finds applications in most anomaly detection processes. This paper extends the concept of AR modeling to create models for the estimated auto-correlation between data and control planes packet counts of the network traffic. These models are fed with the anomaly traffic containing SYN flood attack. The estimated residuals in these scenarios are used as indicators for the attacks. Simulation results revealed the success of attack detection using the proposed approach.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Menoufia Journal of Electronic Engineering Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21608/mjeer.2019.62725","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Due to the sophisticated characteristics of auto-regressive (AR) modeling approach, it finds applications in most anomaly detection processes. This paper extends the concept of AR modeling to create models for the estimated auto-correlation between data and control planes packet counts of the network traffic. These models are fed with the anomaly traffic containing SYN flood attack. The estimated residuals in these scenarios are used as indicators for the attacks. Simulation results revealed the success of attack detection using the proposed approach.