On detection of malicious users using group testing techniques

My T. Thai, Ying Xuan, Incheol Shin, Taieb Znati

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Despite decades of research, there have not been developed concrete defense solutions for most of current attacks to Internet services, let alone new attack types. An essential problem to overcome is that malicious traffic can be similar to legitimate ones. Thus a more fundamental model which should be based on the overall performance of servers/subnets without inspecting each traffic must be remedied. Based on this observation, we propose a novel system framework, called Detection of Malicious Users (DMU) which attempts to solve various attack types. Motivated by DMU, we introduce a new theoretical model, called Size Constraint Group Testing (SCGT). Several algorithms based on SCGT for various networking scenarios are proposed. We also provide several fundamental results on SCGT, revealing some necessary conditions to obtain an O(1) detection time algorithm.

Original languageEnglish
Title of host publicationProceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008
Pages206-213
Number of pages8
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event28th International Conference on Distributed Computing Systems, ICDCS 2008 - Beijing, China
Duration: Jul 17 2008Jul 20 2008

Publication series

NameProceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008

Conference

Conference28th International Conference on Distributed Computing Systems, ICDCS 2008
Country/TerritoryChina
CityBeijing
Period7/17/087/20/08

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'On detection of malicious users using group testing techniques'. Together they form a unique fingerprint.

Cite this