Skip to content

Advertisement

Signal Processing Applications in Network Intrusion Detection Systems

  1. Content type: Research Article

    This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restri...

    Authors: Xiapu Luo, Edmond W. W. Chan and Rocky K. C. Chang

    Citation: EURASIP Journal on Advances in Signal Processing 2009 2009:256821

    Published on:

  2. Content type: Research Article

    Anomaly-based intrusion detection systems have the ability to detect novel attacks, but when applied in real-time detection, they face the challenges of producing many false alarms and failing to match with th...

    Authors: Chin-Tser Huang and Jeff Janies

    Citation: EURASIP Journal on Advances in Signal Processing 2009 2009:589413

    Published on:

  3. Content type: Research Article

    The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption,...

    Authors: Mohamed Hamdi, Amel Meddeb-Makhlouf and Noureddine Boudriga

    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:368589

    Published on:

  4. Content type: Research Article

    This paper presents a novel approach for training a network intrusion detection system based on a query-based sampling (QBS) filter. The proposed QBS filter applies the concepts of data quantization to signal ...

    Authors: Liang-Bin Lai, Ray-I Chang and Jen-Shiang Kouh

    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:735283

    Published on:

  5. Content type: Research Article

    Massively multiplayer online role playing games (MMORPGs) have become extremely popular among network gamers. Despite their success, one of MMORPG's greatest challenges is the increasing use of game bots, that...

    Authors: Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Chin-Laung Lei and Wen-Chin Chen

    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:797159

    Published on:

  6. Content type: Research Article

    Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation). The anomaly transiting in a sing...

    Authors: Li Zonglin, Hu Guangmin, Yao Xingmiao and Yang Dan

    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:752818

    Published on:

  7. Content type: Research Article

    Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal ...

    Authors: Wei Lu and Ali A. Ghorbani

    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:837601

    Published on: