TY - GEN
T1 - SPADE
T2 - 2010 International Conference on High Performance Switching and Routing, HPSR 2010
AU - Tzur-David, Shimrit
AU - Avissar, Harel
AU - Dolev, Danny
AU - Anker, Tal
PY - 2010
Y1 - 2010
N2 - A security engine should detect network traffic attacks at line-speed. "Learning" capabilities can help detecting new and unknown threats even before a vulnerability is exploited. The principal way for achieving this goal is to model anticipated network traffic behavior, and to use this model for identifying anomalies. This paper focuses on denial of service (DoS) attacks and distributed DoS (DDoS). Our goal is detecting and preventing of attacks. The main challenges include minimizing the false-positive rate and the memory consumption. SPADE: a Statistical Packet Acceptance Defense Engine is presented. SPADE is an accurate engine that uses an hierarchical adaptive structure to detect suspicious traffic using a relatively small memory footprint, therefore can be easily applied on hardware. SPADE is based on the assumption that during DoS/DDoS attacks, a significant portion of the traffic that is seen belongs to the attack, therefore, SPADE applies a statistical mechanism to primarily filter the attack's traffic.
AB - A security engine should detect network traffic attacks at line-speed. "Learning" capabilities can help detecting new and unknown threats even before a vulnerability is exploited. The principal way for achieving this goal is to model anticipated network traffic behavior, and to use this model for identifying anomalies. This paper focuses on denial of service (DoS) attacks and distributed DoS (DDoS). Our goal is detecting and preventing of attacks. The main challenges include minimizing the false-positive rate and the memory consumption. SPADE: a Statistical Packet Acceptance Defense Engine is presented. SPADE is an accurate engine that uses an hierarchical adaptive structure to detect suspicious traffic using a relatively small memory footprint, therefore can be easily applied on hardware. SPADE is based on the assumption that during DoS/DDoS attacks, a significant portion of the traffic that is seen belongs to the attack, therefore, SPADE applies a statistical mechanism to primarily filter the attack's traffic.
UR - http://www.scopus.com/inward/record.url?scp=78149278703&partnerID=8YFLogxK
U2 - 10.1109/HPSR.2010.5580287
DO - 10.1109/HPSR.2010.5580287
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:78149278703
SN - 9781424469710
T3 - 2010 International Conference on High Performance Switching and Routing, HPSR 2010
SP - 119
EP - 126
BT - 2010 International Conference on High Performance Switching and Routing, HPSR 2010
Y2 - 13 June 2010 through 16 June 2010
ER -