Detecting Cyber Attacks at Data Dribble

Tariq Ahamad, Abdullah Aljumah, Yasir Ahmad

Abstract


This research article proposes a new technique for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application [1,2]. This technique allows us to detect the most common types of network attack (DDoS and port scanning) and most importantly make a list of IP-addresses of trespassers. So, the technique can be used in intrusion detection systems, and in those systems which can track and lock these IP-addresses.

Keywords: Network Attacks, Intrusion Detection, IP Address of Trespassers, DDoS attack, Cisco NetFlow, flow traffic model.


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: NCS@iiste.org

ISSN (Paper)2224-610X ISSN (Online)2225-0603

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org