Please use this identifier to cite or link to this item: https://repository-scidap.cvtisr.sk//jspui/handle/123456789/23
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHalagan, Tomáš-
dc.contributor.authorKováčik, Tomáš-
dc.contributor.authorTrúchly, Peter-
dc.contributor.authorBinder, Andrej-
dc.date.accessioned2020-02-12T13:18:57Z-
dc.date.available2020-02-12T13:18:57Z-
dc.date.issued2015-11-
dc.identifier.isbn978-3-319-24314-6-
dc.identifier.urihttps://doi.org/10.1007/978-3-319-24315-3_4-
dc.identifier.urihttps://repository-scidap.cvtisr.sk//xmlui/handle/123456789/23-
dc.description.abstractPresented work focuses onto proposal, implementation and evaluation of the new method for detection and type identification of SYN flood (DoS) attacks. The method allows distinguishing type of detected SYN flood attacks – random, subnet or fixed. Based on Counting Bloom filter, the attack detection and identification algorithm is proposed, implemented and evaluated in KaTaLyzer network traffic monitoring tool. Proof of correctness of the approach for TCP SYN flood attack detection and type identification is provided – both in practical and theoretical manners. In practice, new module for KaTaLyzer is implemented and TCP attacks are detected, identified and network administrator is notified about them in real-time.en_US
dc.language.isoenen_US
dc.publisherSpringer, Cham-
dc.subjectDoS detectionen_US
dc.subjectDoS identificationen_US
dc.subjectCounting Bloom Filteren_US
dc.subjectTCPen_US
dc.subjectSYNen_US
dc.subjectFlood attacken_US
dc.subjectNetwork securityen_US
dc.titleSyn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filteren_US
dc.typeBook chapteren_US
dc.typetext-
Appears in Collections:Kapitoly

Files in This Item:
File Description SizeFormat 
Halagan2015_Chapter_SynFloodAttackDetectionAndType.pdf755.12 kBapplication/pdfView/Open
crepc_1.txt4.81 kBTextView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.