JOURNAL ARTICLE

Adaptive Defense Against Various Network Attacks

Cliff C. ZouNick DuffieldDon TowsleyWeibo Gong

Year: 2006 Journal:   IEEE Journal on Selected Areas in Communications Vol: 24 (10)Pages: 1877-1888   Publisher: Institute of Electrical and Electronics Engineers

Abstract

In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions and dynamically changing attacks. Therefore, a good defense system needs to have a built-in "adaptive defense" functionality based on cost minimization-adaptively adjusting its configurations according to the network condition and attack severity in order to minimize the combined cost introduced by false positives (misidentify normal traffic as attack) and false negatives (misidentify attack traffic as normal) at any time. In this way, the adaptive defense system can generate fewer false alarms in normal situations or under light attacks with relaxed defense configurations, while protecting a network or a server more vigorously under severe attacks. In this paper, we present concrete adaptive defense system designs for defending against two major network attacks: SYN flood DDoS attack and Internet worm infection. The adaptive defense is a high-level system design that can be built on various underlying nonadaptive detection and filtering algorithms, which makes it applicable for a wide range of security defenses

Keywords:
Denial-of-service attack Computer science Computer security Application layer DDoS attack False positive paradox Network security The Internet False positives and false negatives Computer network Artificial intelligence

Metrics

5
Cited By
0.00
FWCI (Field Weighted Citation Impact)
29
Refs
0.22
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
© 2026 ScienceGate Book Chapters — All rights reserved.