Skip to main content

Signal Processing Applications in Network Intrusion Detection Systems

  1. This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restri...

    Authors: Xiapu Luo, Edmond W. W. Chan and Rocky K. C. Chang
    Citation: EURASIP Journal on Advances in Signal Processing 2009 2009:256821
  2. Anomaly-based intrusion detection systems have the ability to detect novel attacks, but when applied in real-time detection, they face the challenges of producing many false alarms and failing to match with th...

    Authors: Chin-Tser Huang and Jeff Janies
    Citation: EURASIP Journal on Advances in Signal Processing 2009 2009:589413
  3. The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption,...

    Authors: Mohamed Hamdi, Amel Meddeb-Makhlouf and Noureddine Boudriga
    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:368589
  4. This paper presents a novel approach for training a network intrusion detection system based on a query-based sampling (QBS) filter. The proposed QBS filter applies the concepts of data quantization to signal ...

    Authors: Liang-Bin Lai, Ray-I Chang and Jen-Shiang Kouh
    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:735283
  5. Massively multiplayer online role playing games (MMORPGs) have become extremely popular among network gamers. Despite their success, one of MMORPG's greatest challenges is the increasing use of game bots, that...

    Authors: Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Chin-Laung Lei and Wen-Chin Chen
    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:797159
  6. Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation). The anomaly transiting in a sing...

    Authors: Li Zonglin, Hu Guangmin, Yao Xingmiao and Yang Dan
    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:752818
  7. Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we propose a new network signal ...

    Authors: Wei Lu and Ali A. Ghorbani
    Citation: EURASIP Journal on Advances in Signal Processing 2008 2009:837601