메뉴 건너뛰기




Volumn 3320, Issue , 2004, Pages 596-599

Probability principle of a reliable approach to detect signs of DDOS flood attacks

Author keywords

Anomaly intrusion detection; DDOS; Intrusion prevention; Probability; Reliability; Statistical detection

Indexed keywords

COMPUTER CRIME; MATHEMATICAL MODELS; PROBABILITY; RELIABILITY; TELECOMMUNICATION SERVICES; TELECOMMUNICATION TRAFFIC; WEBSITES;

EID: 13944272291     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30501-9_114     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 2
    • 1242331287 scopus 로고    scopus 로고
    • TBSE - An engineering approach to the design of accurate and reliable security systems
    • Feb.
    • J. Leach, TBSE - an engineering approach to the design of accurate and reliable security systems, Computer & Security, 23 (1), Feb. 2004, 22-28.
    • (2004) Computer & Security , vol.23 , Issue.1 , pp. 22-28
    • Leach, J.1
  • 3
    • 8344244591 scopus 로고    scopus 로고
    • An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
    • M. Li, An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition, 23(7), Computer & Security, 2004, 549-558.
    • (2004) Computer & Security , vol.23 , Issue.7 , pp. 549-558
    • Li, M.1
  • 4
    • 1642566050 scopus 로고    scopus 로고
    • Why information security is now multi-disciplinary, multi-departmental, and multi-organizational in nature
    • Jan.
    • C. C. Wood, Why information security is now multi-disciplinary, multi-departmental, and multi-organizational in nature, Computer Fraud & Security, Vol. 2004, Issue 1, Jan. 2004, 16-17.
    • (2004) Computer Fraud & Security , vol.2004 , Issue.1 , pp. 16-17
    • Wood, C.C.1
  • 5
    • 0346036085 scopus 로고    scopus 로고
    • Modeling autocorrelation function of self-similar teletraffic in communication networks based on optimal approximation in Hilbert space
    • M. Li, et al, Modeling autocorrelation function of self-similar teletraffic in communication networks based on optimal approximation in Hilbert space, Applied Mathematical Modelling, 27 (3), 2003, 155-168.
    • (2003) Applied Mathematical Modelling , vol.27 , Issue.3 , pp. 155-168
    • Li, M.1
  • 6
    • 0942299299 scopus 로고    scopus 로고
    • A correlation based computational model for synthesizing long-range dependent data
    • Sep.-Nov.
    • M. Li and C.-H. Chi, A correlation based computational model for synthesizing long-range dependent data, Journal of the Franklin Institute, 340 (6/7), Sep.-Nov. 2003, 503-514.
    • (2003) Journal of the Franklin Institute , vol.340 , Issue.6-7 , pp. 503-514
    • Li, M.1    Chi, C.-H.2
  • 7
    • 0034648575 scopus 로고    scopus 로고
    • Correlation form of timestamp increment sequences of self-similar traffic on Ethernet
    • Sep.
    • M. Li, et al, Correlation form of timestamp increment sequences of self-similar traffic on Ethernet, Electronics Letters, 36 (19), Sep. 2000, 1168-1169.
    • (2000) Electronics Letters , vol.36 , Issue.19 , pp. 1168-1169
    • Li, M.1
  • 8
    • 0031191180 scopus 로고    scopus 로고
    • Traffic models in broadband networks
    • A. Adas, Traffic models in broadband networks, IEEE Communications Magazine, 35 (7), 1997, 82-89.
    • (1997) IEEE Communications Magazine , vol.35 , Issue.7 , pp. 82-89
    • Adas, A.1
  • 9
    • 0031338888 scopus 로고    scopus 로고
    • Teletraffic engineering in a broad-band era
    • Dec.
    • H. Michiel and K. Laevens, Teletraffic engineering in a broad-band era, Proc. of IEEE, 85 (12), Dec. 1997, 2007-2033.
    • (1997) Proc. of IEEE , vol.85 , Issue.12 , pp. 2007-2033
    • Michiel, H.1    Laevens, K.2
  • 13
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the Internet
    • April
    • 13 L. Garber, Denial-of-service attacks rip the Internet, IEEE Computer, 33 (4) April 2000, 12-17.
    • (2000) IEEE Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 14
    • 0038755581 scopus 로고    scopus 로고
    • Intrusion detection: An introduction to internet surveillance, correlation, traps, trace back, and response
    • E. G. Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response, Intrusion.Net Book, 1999.
    • (1999) Intrusion.Net Book
    • Amoroso, E.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.