{"title":"识别有效的网络特征,检测Smurf攻击","authors":"Gholam Reza Zargar, P. Kabiri","doi":"10.1109/SCORED.2009.5443345","DOIUrl":null,"url":null,"abstract":"Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion detection systems, feature reduction, feature extraction and feature selection play important role in a sense of improving classification accuracy while keeping the computational complexity at minimum. Smurf attack is one of the common denial-of-service attack methods. In this paper, principal component analysis method is used for feature selection and dimension reduction. TCP dump from DARPA98 dataset is used for the experiments. 32 basic features are extracted for the selection of effective features in TCP/IP header to detect Smurf attacks.","PeriodicalId":443287,"journal":{"name":"2009 IEEE Student Conference on Research and Development (SCOReD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Identification of effective network features to detect Smurf attacks\",\"authors\":\"Gholam Reza Zargar, P. Kabiri\",\"doi\":\"10.1109/SCORED.2009.5443345\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion detection systems, feature reduction, feature extraction and feature selection play important role in a sense of improving classification accuracy while keeping the computational complexity at minimum. Smurf attack is one of the common denial-of-service attack methods. In this paper, principal component analysis method is used for feature selection and dimension reduction. TCP dump from DARPA98 dataset is used for the experiments. 32 basic features are extracted for the selection of effective features in TCP/IP header to detect Smurf attacks.\",\"PeriodicalId\":443287,\"journal\":{\"name\":\"2009 IEEE Student Conference on Research and Development (SCOReD)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE Student Conference on Research and Development (SCOReD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCORED.2009.5443345\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE Student Conference on Research and Development (SCOReD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCORED.2009.5443345","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Identification of effective network features to detect Smurf attacks
Intrusion detection system (IDS) detects intrusion attempts on computer systems. In intrusion detection systems, feature reduction, feature extraction and feature selection play important role in a sense of improving classification accuracy while keeping the computational complexity at minimum. Smurf attack is one of the common denial-of-service attack methods. In this paper, principal component analysis method is used for feature selection and dimension reduction. TCP dump from DARPA98 dataset is used for the experiments. 32 basic features are extracted for the selection of effective features in TCP/IP header to detect Smurf attacks.