메뉴 건너뛰기




Volumn 28, Issue 3-4, 2005, Pages 435-451

DDoS attack detection and wavelets

Author keywords

Attack detection; Distributed denial of service; Energy distribution; Traffic characterization; Wavelet analysis

Indexed keywords

CODES (STANDARDS); COMPUTATIONAL COMPLEXITY; CONGESTION CONTROL (COMMUNICATION); INTERNET; TELECOMMUNICATION SERVICES; TELECOMMUNICATION TRAFFIC; WAVELET TRANSFORMS;

EID: 17444397467     PISSN: 10184864     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11235-004-5581-0     Document Type: Conference Paper
Times cited : (65)

References (28)
  • 2
    • 0001173444 scopus 로고    scopus 로고
    • Long-range dependence: Revisiting aggregation with wavelets
    • May
    • P. Abry, D. Veitch and P. Flandrin, Long-range dependence: Revisiting aggregation with wavelets, Journal of Time Series Analysis 19 (May 1998) 253-266.
    • (1998) Journal of Time Series Analysis , vol.19 , pp. 253-266
    • Abry, P.1    Veitch, D.2    Flandrin, P.3
  • 3
    • 0032090155 scopus 로고    scopus 로고
    • Generating representative Web workloads for network and server performance evaluation
    • P. Barford and M.E. Crovella, Generating representative Web workloads for network and server performance evaluation, in: ACM SigMetrics (1998) pp. 151-160.
    • (1998) ACM SigMetrics , pp. 151-160
    • Barford, P.1    Crovella, M.E.2
  • 5
    • 0041488497 scopus 로고    scopus 로고
    • 8 April
    • CERT, Overview of attack trends, http://www.cert.org/archive/pdf/ attack_trends.pdf (8 April 2002).
    • (2002) Overview of Attack Trends
  • 7
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attack: A tutorial
    • R.K.C. Chang, Defending against flooding-based distributed denial-of-service attack: A tutorial, IEEE Communication Magazine 40(10) (2002) 42-51.
    • (2002) IEEE Communication Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 8
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in World Wide Web traffic: Evidence and possible causes
    • M.E. Crovella and A. Bestavros, Self-similarity in World Wide Web traffic: Evidence and possible causes, IEEE/ACM Transactions on Networking 5(6) (1997) 835-846.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2
  • 9
    • 0025482241 scopus 로고
    • The wavelet transform, time-frequency localization and signal analysis
    • September
    • I. Daubechies, The wavelet transform, time-frequency localization and signal analysis, IEEE Transactions on Information Theory 36 (September 1990) 961-1005.
    • (1990) IEEE Transactions on Information Theory , vol.36 , pp. 961-1005
    • Daubechies, I.1
  • 10
    • 17444409457 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ IP address spoofing
    • January
    • P. Ferguson and D. Senie, Network ingress filtering: Defeating denial of service attacks which employ IP address spoofing, Internet draft (January 1998).
    • (1998) Internet Draft
    • Ferguson, P.1    Senie, D.2
  • 11
    • 0012292276 scopus 로고
    • A neural network approach towards intrusion detection
    • Harris Corporation July
    • K. Fox, R. Henning, J. Reed and R. Simonian, A neural network approach towards intrusion detection, Technical Report, Harris Corporation (July 1990).
    • (1990) Technical Report
    • Fox, K.1    Henning, R.2    Reed, J.3    Simonian, R.4
  • 15
    • 0035481772 scopus 로고    scopus 로고
    • Modeling heterogeneous network traffic in wavelet domain
    • S. Ma and C. Ji, Modeling heterogeneous network traffic in wavelet domain, IEEE/ACM Transactions on Networking 9(5) (2001) 634-649.
    • (2001) IEEE/ACM Transactions on Networking , vol.9 , Issue.5 , pp. 634-649
    • Ma, S.1    Ji, C.2
  • 17
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack
    • April
    • K. Park and H. Lee, On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, in: Proc. of IEEE INFOCOM'01 (April 2001) pp. 338-347.
    • (2001) Proc. of IEEE INFOCOM'01 , pp. 338-347
    • Park, K.1    Lee, H.2
  • 18
    • 0029323403 scopus 로고
    • Wide area traffic: The failure of Poisson modeling
    • V. Paxson and S. Floyd, Wide area traffic: The failure of Poisson modeling, IEEE/ACM Transactions on Networking 3(3) (1995) 226-244.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 20
    • 23044527800 scopus 로고    scopus 로고
    • Contradictory relationship between Hurst parameter and queueing performance (extended version)
    • February
    • R. Ritke, X. Hong and M. Gerla, Contradictory relationship between Hurst parameter and queueing performance (extended version), Telecommunication Systems 16 (February 2001) 159-175.
    • (2001) Telecommunication Systems , vol.16 , pp. 159-175
    • Ritke, R.1    Hong, X.2    Gerla, M.3
  • 21
    • 0034239268 scopus 로고    scopus 로고
    • Real-time estimation of the parameters of long-range dependence
    • August
    • M. Roghan, D. Veitch and P. Abry, Real-time estimation of the parameters of long-range dependence, IEEE/ACM Transactions on Networking 8 (August 2000) 467-478.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , pp. 467-478
    • Roghan, M.1    Veitch, D.2    Abry, P.3
  • 26
    • 0036349135 scopus 로고    scopus 로고
    • A unified framework for understanding network traffic using independent wavelet models
    • June
    • X. Tian, J. Wu and C. Ji, A unified framework for understanding network traffic using independent wavelet models, in: Proc. of IEEE INFOCOM (June 2002).
    • (2002) Proc. of IEEE INFOCOM
    • Tian, X.1    Wu, J.2    Ji, C.3
  • 27
    • 0141776045 scopus 로고    scopus 로고
    • A Markov chain model of temporal behavior for anomaly detection
    • June
    • N. Ye, A Markov chain model of temporal behavior for anomaly detection, in: Workshop on Information Assurance and Security (June 2000).
    • (2000) Workshop on Information Assurance and Security
    • Ye, N.1
  • 28
    • 0042474246 scopus 로고    scopus 로고
    • Small-time scaling behaviors of Internet backbone traffic: An empirical study
    • April
    • Z. Zhang, V.J. Ribeiro, S. Moon and C. Diot, Small-time scaling behaviors of Internet backbone traffic: An empirical study, in: Proc. of IEEE INFOCOM (April 2003).
    • (2003) Proc. of IEEE INFOCOM
    • Zhang, Z.1    Ribeiro, V.J.2    Moon, S.3    Diot, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.