Attacks Analysis of TCP And UDP Of UNCW-NB15 Dataset

Asghar Ali Shah, Yaser Danial Khan, Muhammad Adeel Ashraf

Abstract


TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are the most important protocols in complete protocol architecture.  There are many types of attacks that can block the communication or reduce the performance of a protocol. This study provides a detail analysis of TCP and UDP attacks and their application layer protocols. The authors will also suggest that where the security administrator should focus for providing best security. The old datasets such as KDD99 and NSLKDD has many limitations. This study uses UNSW-NB15 dataset which has recently been generated.

Full Text:

PDF

References


“Kumar,S,. Rai, S.,(2012),Survey on Transport Layer Protocols: TCP & UDP, International Journal of Computer Applications, 46, 7, 0975-8887

Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. A. (2009, July). A detailed analysis of the KDD CUP 99 data set. In Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on (pp. 1-6). IEEE.

Moustafa, N., & Slay, J. (2016). The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set. Information Security Journal: A Global Perspective, 25(1-3), 18-31.

UNSW-NB15 Dataset for Network Intrussion Detection System. Retrieved from https://cloudstor.aarnet.edu.au/plus/index.php/s/ 2DhnLGDdEECo4ys, 2018-03-12

Moustafa, N., & Slay, J. (2015, November). UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In Military Communications and Information Systems Conference (MilCIS), 2015 (pp. 1-6). IEEE.

“Shah, Asghar Ali; Khiyal, Malik Sikander Hayat; Awan, Muhammad Daud;(2015)”, Analysis of Machine learning Technique for Intrussion Detection System: A Review, Internation Journal of Computer Applicatoins, 119, 3, 0975-8887.

Salem, M., & Buehler, U. (2012). Mining techniques in network security to enhance intrusion detection systems. arXiv preprint arXiv:1212.2414.

Ashfaq, R. A. R., Wang, X. Z., Huang, J. Z., Abbas, H., & He, Y. L. (2017). Fuzziness based semi-supervised learning approach for intrusion detection system. Information Sciences, 378, 484-497.

Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.

Eom, J. H., Kim, N. U., Kim, S. H., & Chung, T. M. (2012, June). Cyber military strategy for cyberspace superiority in cyber warfare. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 295-299). IEEE.

Vatis, M. A. (2001). Cyber attacks during the war on terrorism: A predictive analysis. Dartmouth Coll Hanover Nh Inst For Security.




DOI: http://dx.doi.org/10.21015/vtcs.v15i3.528

Refbacks

  • There are currently no refbacks.