Analysis And Detection Of Slowcomm And Slownext Dos Attacks

but.event.date27.04.2021cs
but.event.titleSTUDENT EEICT 2021cs
dc.contributor.authorSikora, Marek
dc.date.accessioned2021-07-21T07:06:59Z
dc.date.available2021-07-21T07:06:59Z
dc.date.issued2021cs
dc.description.abstractThis paper describes the proposal of Slowcomm and Slow Next attack models and theirimplementation. The attack generator is used to discover the vulnerabilities of several Internet servicesin an experimental network. Based on the described characteristics of attacks, these attacks’detection methods are investigated and implemented as an intrusion detection system (IDS).en
dc.formattextcs
dc.format.extent322-326cs
dc.format.mimetypeapplication/pdfen
dc.identifier.citationProceedings I of the 27st Conference STUDENT EEICT 2021: General papers. s. 322-326. ISBN 978-80-214-5942-7cs
dc.identifier.isbn978-80-214-5942-7
dc.identifier.urihttp://hdl.handle.net/11012/200772
dc.language.isoencs
dc.publisherVysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologiícs
dc.relation.ispartofProceedings I of the 27st Conference STUDENT EEICT 2021: General papersen
dc.relation.urihttps://conf.feec.vutbr.cz/eeict/index/pages/view/ke_stazenics
dc.rights© Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologiícs
dc.rights.accessopenAccessen
dc.subjectSlow DoS attacksen
dc.subjectSlowcommen
dc.subjectSlow Nexten
dc.subjectattack generatoren
dc.subjectIDSen
dc.subjectintrusion detectionsystemen
dc.subjectdetection signaturesen
dc.titleAnalysis And Detection Of Slowcomm And Slownext Dos Attacksen
dc.type.driverconferenceObjecten
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.affiliatedInstitution.departmentFakulta elektrotechniky a komunikačních technologiícs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
322_eeict-2021_1.pdf
Size:
296.62 KB
Format:
Adobe Portable Document Format
Description: