On detection of malicious users using group testing techniques

MT Thai, Y Xuan, I Shin, T Znati - 2008 The 28th International …, 2008 - ieeexplore.ieee.org
2008 The 28th International Conference on Distributed Computing …, 2008ieeexplore.ieee.org
Despite decades of research, there have not been developed concrete defense solutions for
most of current attacks to Internet services, let alone new attack types. An essential problem
to overcome is that malicious traffic can be similar to legitimate ones. Thus a more
fundamental model which should be based on the overall performance of servers/subnets
without inspecting each traffic must be remedied. Based on this observation, we propose a
novel system framework, called detection of malicious users (DMU) which attempts to solve …
Despite decades of research, there have not been developed concrete defense solutions for most of current attacks to Internet services, let alone new attack types. An essential problem to overcome is that malicious traffic can be similar to legitimate ones. Thus a more fundamental model which should be based on the overall performance of servers/subnets without inspecting each traffic must be remedied. Based on this observation, we propose a novel system framework, called detection of malicious users (DMU) which attempts to solve various attack types. Motivated by DMU, we introduce a new theoretical model, called size constraint group testing (SCGT). Several algorithms based on SCGT for various networking scenarios are proposed. We also provide several fundamental results on SCGT, revealing some necessary conditions to obtain an O(1) detection time algorithm.
ieeexplore.ieee.org
Showing the best result for this search. See all results