Asee peer logo

Analysis of the Low Rate of Denial of Service Attacks Detection by Using Statistical Fisher Methods

Download Paper |


2018 ASEE Mid-Atlantic Section Spring Conference


Washington, District of Columbia

Publication Date

April 6, 2018

Start Date

April 6, 2018

End Date

April 7, 2018

Tagged Topic


Page Count




Permanent URL

Download Count


Request a correction

Paper Authors

author page

Yasser R Salem University of the District of Columbia


Paul Cotae University of the District of Columbia

visit author page

Dr. Paul Cotae,Professor of Electrical and Computer Engineering has more than 25
years of experience in the communication field (research and education). He received a Dipl. Ing.
and a M.S. degrees in communication and electronic engineering in 1980 from the Technical
University of Iassy and a Ph.D. degree in telecommunications from “Politechnica” University of
Bucharest, Romania in 1991, and a Master in Applied Mathematics in 1998 from the University
of Colorado at Boulder. From 1994 to 1998 he spent four years at the University of Colorado at
Colorado Springs and the University of Colorado at Boulder as a Fulbright Scholar and Visiting
Associate Professor doing research and teaching in ECE department and APPM department. He
served also as a consultant to Navsys Corp., Colorado Springs, in 1997. From 2002 to 2008 he
was with the Department of Electrical and Computer engineering at the University of Texas at
San Antonio (UTSA). From 1984 to 2001, he was with the Department of Electrical Engineering,
Technical University of Iassy, where he conducted research and teaching in the area of digital
communications as a Full Professor at the same department. Since 2008, he has been with the
University of the District of Columbia as an Associate Professor. His current research interests
include multiple access, modulation and coding, mobile communications, and digital
communication systems. He has authored or coauthored more than 100 papers in these areas and
four books. Dr. Cotae serves as an Associate Editor for IEEE Communication Letters, EURASIP
Journal on Signal Processing, Elsevier International Journal of Computers and Electrical
Engineering (JCEE), and he has been on the Technical Program Committee and Session chair of
the IEEE Conferences GLOBECOM (2003-2011), VTC Spring 2005, 2006 and ICC 2005-2011.
He is a Senior Member of IEEE, member of ASEE, member of HKN (Eta Kappa Nu) and SIAM.
He is cited in Who’s Who in American Education, Who’s Who in America, and in Who’s Who in
the World. He has been nominated two times for the best teacher award (2005 and 2006) in the
College of Engineering at UTSA. He is the IEEE Vice Chair Washington Section and IEEE ComSoc chair Whasington
DC Section. He is Faculty Fellow for the ONR-ASEE Summer Faculty Research Program 2009-2018.

visit author page

Download Paper |


The paper emphasizes on the cybersecurity for the Low Rate of Denial of Service (LR DOS) attacks. By exploiting the weaknesses of the TCP/IP protocol, attackers send a cracking packet quasiperiodic in order to overabundance the server before TCP sender enters retransmission timeout (RTO) phase. Therefore, the attacker causes lost packets for the legitimate users. Because of lost packets, TCP sender is going to enter in RTO phase again. In meanwhile, attacker resend packets again during the RTO duration, so any user can get through it. Therefore, attacker synchronizes with the RTO period and in this way the attacker can overcontrol the legitimate user TCP. In this paper, we focus on the detection of Low Rate Denial of Service attacks explaining the mechanisms how these attacks are effective and how they can damage the security of the computers networks. We use the Fisher statistics methods for detection of the LR DoS attacks. Our results show that these attacks are effectively identified by using Fisher vector and Fisher statistical methods for one dominant periodically component as in the case of these attacks. Our paper aims to identify and to detect LR DoS attacks. We use statistical method to find the data that hiding in the process then, we use the Fisher vector method to identify the malicious data. In addition, we are going to analyze and simulate all flows in a computer network by using Matlab.

Salem, Y. R., & Cotae, P. (2018, April), Analysis of the Low Rate of Denial of Service Attacks Detection by Using Statistical Fisher Methods Paper presented at 2018 ASEE Mid-Atlantic Section Spring Conference, Washington, District of Columbia. 10.18260/1-2--29454

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2018 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015