-
3
-
-
28844491048
-
Traffic incident detection using evidential reasoning based data fusion
-
Toronto, Canada
-
S.C. Byun, D.B. Choi and B.H. Ahn, Traffic incident detection using evidential reasoning based data fusion, in: Proceeding of the 6th World Congress on Intelligent Transport Systems, Toronto, Canada, 1999.
-
(1999)
Proceeding of the 6th World Congress on Intelligent Transport Systems
-
-
Byun, S.C.1
Choi, D.B.2
Ahn, B.H.3
-
6
-
-
0041534324
-
Characteristics of network traffic flow anomalies
-
New York, ACM Press
-
P. Barford and D. Plonka, Characteristics of network traffic flow anomalies, in: Proceedings of the First ACM SIGCOMM Internet Measurement Workshop, New York, ACM Press, 2001, pp. 69-74.
-
(2001)
Proceedings of the First ACM SIGCOMM Internet Measurement Workshop
, pp. 69-74
-
-
Barford, P.1
Plonka, D.2
-
8
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
T. Bass, Intrusion detection systems and multisensor data fusion. Communications of the ACM 43(4) (2000), 99-105.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
11
-
-
1642535783
-
A novel approach to detection of denial of service attacks via adaptive sequential and batch-sequential change-point detection methods
-
R. Blazek, H. Kim, B. Rozovskii and A. Tartakovsky, A novel approach to detection of denial of service attacks via adaptive sequential and batch-sequential change-point detection methods, in: IEEE Workshop on Information Assurance and Security, 2001, pp. 220-226.
-
(2001)
IEEE Workshop on Information Assurance and Security
, pp. 220-226
-
-
Blazek, R.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
14
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables - A feasibility study
-
J.B.D. Cabrera, L. Lewis, X. Qin, W. Lee, R.K. Prasanth, B. Ravichandran and R.K. Mehra, Proactive detection of distributed denial of service attacks using MIB traffic variables - A feasibility study, in: Proceedings of International Symposium on Integrated Network Management, 2001.
-
(2001)
Proceedings of International Symposium on Integrated Network Management
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Prasanth, R.K.5
Ravichandran, B.6
Mehra, R.K.7
-
17
-
-
28844482602
-
S2I: A tool for automatic rule match compilation for the IXP network processor
-
Vienna
-
I. Charitakis, D. Pnevmatikatos, E. Markatos and K. Anagnostakis, S2I: a tool for automatic rule match compilation for the IXP network processor, in: Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2003), Vienna, 2003.
-
(2003)
Proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2003)
-
-
Charitakis, I.1
Pnevmatikatos, D.2
Markatos, E.3
Anagnostakis, K.4
-
18
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
Division of Engineering and Applied Science Harvard University
-
C.-M. Cheng, H. Kung and K.-S. Tan, Use of spectral analysis in defense against DoS attacks, in: Proceedings of IEEE GLOBECOM, Division of Engineering and Applied Science Harvard University, 2002.
-
(2002)
Proceedings of IEEE GLOBECOM
-
-
Cheng, C.-M.1
Kung, H.2
Tan, K.-S.3
-
19
-
-
85039355361
-
-
CISCO, Netflow, http://www.cisco.com/go/netflow.
-
Netflow
-
-
-
22
-
-
84862365987
-
-
CISCO, Using CAR during DoS attacks, http://www.cisco.com/warp/public/63/ car_rate_limit_icmp.html.
-
Using CAR during DoS Attacks
-
-
-
23
-
-
27544450524
-
Scampi - A scaleable monitoring platform for the Internet
-
Budapest, Hungary
-
J. Coppens, E. Markatos, J. Novotny, M. Polychronakis, V. Smotlacha and S. Ubik, Scampi - a scaleable monitoring platform for the Internet, in: 2nd International Workshop on Inter-Domain Performance and Simulation (IPS 2004), Budapest, Hungary, 2004.
-
(2004)
2nd International Workshop on Inter-domain Performance and Simulation (IPS 2004)
-
-
Coppens, J.1
Markatos, E.2
Novotny, J.3
Polychronakis, M.4
Smotlacha, V.5
Ubik, S.6
-
26
-
-
85025403958
-
An algebraic approach to IP traceback
-
D. Dean, M. Franklin and A. Stubblefield, An algebraic approach to IP traceback, ACM Transactions on Information and System Security 5(2) (2002), 119-137.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 119-137
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
27
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
Karlsruhe, Germany
-
C. Estan, S. Savage and G. Varghese, Automatically inferring patterns of resource consumption in network traffic, in : Proceedings of the ACM SIGCOMM Conference, Karlsruhe, Germany, 2003.
-
(2003)
Proceedings of the ACM SIGCOMM Conference
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
30
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
USENIX, ed., Washington, DC, USA, Berkeley, CA, USA, USENIX
-
T.M. Gil and M. Poletto, MULTOPS: A data-structure for bandwidth attack detection, in: Proceedings of the 10th USENIX Security Symposium, 2001, USENIX, ed., Washington, DC, USA, Berkeley, CA, USA, USENIX, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium, 2001
-
-
Gil, T.M.1
Poletto, M.2
-
32
-
-
0028543366
-
Training feedforward networks with the Marquardt algorithm
-
M.T. Hagan and M. Menhaj, Training feedforward networks with the Marquardt algorithm, IEEE Transactions on Neural Networks 5(6) (1994), 989-993.
-
(1994)
IEEE Transactions on Neural Networks
, vol.5
, Issue.6
, pp. 989-993
-
-
Hagan, M.T.1
Menhaj, M.2
-
34
-
-
33947521742
-
Identification of repeated attack scenarios using network traffic forensics
-
USC/Information Sciences Institute, August
-
A. Hussain, J. Heidemann and C. Papadopoulos, Identification of repeated attack scenarios using network traffic forensics, Technical Report ISI-TR-2003-577, USC/Information Sciences Institute, August 2003.
-
(2003)
Technical Report
, vol.ISI-TR-2003-577
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
36
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
San Diego, California, The Internet Society
-
J. Ioannidis and S.M. Bellovin, Implementing pushback: Router-based defense against DDoS attacks, in: Proceedings of Network and Distributed System Security Symposium, San Diego, California, The Internet Society, 2002.
-
(2002)
Proceedings of Network and Distributed System Security Symposium
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
37
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
J. Ioannidis, R. Mahajan, S. Floyd, S. Shenker, S.M. Bellovin and V. Paxson, Controlling high bandwidth aggregates in the network, Computer Communications Review 32(3) (2002), 62-73.
-
(2002)
Computer Communications Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Ioannidis, J.1
Mahajan, R.2
Floyd, S.3
Shenker, S.4
Bellovin, S.M.5
Paxson, V.6
-
40
-
-
3543088029
-
Detecting network attacks in the internet via statistical network traffic normality prediction
-
Special Issue: Security and Management
-
J. Jiang and S. Papavassiliou, Detecting network attacks in the internet via statistical network traffic normality prediction, Journal of Network and Systems Management 12 (March) (2004), 51-72. Special Issue: Security and Management.
-
(2004)
Journal of Network and Systems Management
, vol.12
, Issue.MARCH
, pp. 51-72
-
-
Jiang, J.1
Papavassiliou, S.2
-
42
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
IEEE
-
J. Jung, B. Krishnamurthy and M. Rabinovich, Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites, in: Proceedings of the International World Wide Web Conference, IEEE, 2002, pp. 252-262.
-
(2002)
Proceedings of the International World Wide Web Conference
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
43
-
-
0012882330
-
Theory of evidence - A survey of its mathematical foundations, applications and computational analysis
-
J. Kohlas and P. Monney, Theory of evidence - a survey of its mathematical foundations, applications and computational analysis, ZOR - Mathematical Methods of Operations Research 39 (1994), 35-68.
-
(1994)
ZOR - Mathematical Methods of Operations Research
, vol.39
, pp. 35-68
-
-
Kohlas, J.1
Monney, P.2
-
44
-
-
0013347997
-
Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics
-
Dec.
-
A. Kukarni, S. Bush and S. Evans, Detecting distributed denial-of-service attacks using Kolmogorov complexity metrics, GE CRD Technical Report 2001 CRD176, Dec. 2001.
-
(2001)
GE CRD Technical Report 2001
, vol.CRD176
-
-
Kukarni, A.1
Bush, S.2
Evans, S.3
-
45
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
H. Lee, On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM 2001, 2001.
-
(2001)
Proceedings of ACM SIGCOMM 2001
-
-
Lee, H.1
-
46
-
-
84952326439
-
DDoS attack detection and wavelets
-
Dallas, TX, USA
-
L. Li and G. Lee, DDoS attack detection and wavelets, in: 12th International conference on Computer Communications and Networks (ICCCN), Dallas, TX, USA, 2003.
-
(2003)
12th International Conference on Computer Communications and Networks (ICCCN)
-
-
Li, L.1
Lee, G.2
-
48
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
ISSN: 0163-6804
-
C. Manikopoulos and S. Papavassiliou, Network intrusion and fault detection: a statistical anomaly approach, IEEE Communications Magazine 40 (Oct.) (2002), 76-82. Issue: 10, ISSN: 0163-6804.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10 OCT.
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
49
-
-
84872132631
-
-
Mazu Networks, White papers, http://www.mazunetworks.com/solutions/ white_papers/.
-
White Papers
-
-
-
50
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France
-
J. Mirkovic, G. Prier and P. Reiher, Attacking DDoS at the source, in: Proceedings of ICNP, Paris, France, 2002, pp. 312-321.
-
(2002)
Proceedings of ICNP
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
55
-
-
24644432749
-
Proactively detecting DDoS attack using source IP address monitoring
-
Athens, Greece
-
T. Peng, C. Leckie and R. Kotagiri, Proactively detecting DDoS attack using source IP address monitoring, in: Networking 2004, Athens, Greece, 2004.
-
(2004)
Networking 2004
-
-
Peng, T.1
Leckie, C.2
Kotagiri, R.3
-
56
-
-
38049152816
-
Detecting distributed denial of service attacks by sharing distributed beliefs
-
Wollongong, Australia
-
T. Peng, C. Leckie and K. Ramamohanarao, Detecting distributed denial of service attacks by sharing distributed beliefs, in: 8th Australasian Conference on Information Security and Privacy, Wollongong, Australia, 2003.
-
(2003)
8th Australasian Conference on Information Security and Privacy
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
57
-
-
84890503292
-
Application of sampling methodologies to network traffic characterization
-
G.C. Polyzos, H. Werner Braun and K.C. Claffy, Application of sampling methodologies to network traffic characterization, in: ACM SIGCOMM, 1993, pp. 194-203.
-
(1993)
ACM SIGCOMM
, pp. 194-203
-
-
Polyzos, G.C.1
Braun, H.W.2
Claffy, K.C.3
-
63
-
-
2442505788
-
Towards multisensor data fusion for DoS detection
-
Nicosia, Cyprus
-
C. Siaterlis and B. Maglaris, Towards multisensor data fusion for DoS detection, in: Proceedings of ACM SAC '04, Nicosia, Cyprus, 2004.
-
(2004)
Proceedings of ACM SAC '04
-
-
Siaterlis, C.1
Maglaris, B.2
-
65
-
-
0034775309
-
Hash-based IP traceback
-
Proceedings of the ACM SIGCOMM 2001 Conference, New York, ACM Press
-
A.C. Snoeren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent and W.T. Stayer, Hash-based IP traceback, in: Proceedings of the ACM SIGCOMM 2001 Conference, Volume 31, 4 of Computer Communication Review, New York, ACM Press, 2001, pp. 3-14.
-
(2001)
Computer Communication Review
, vol.31
, Issue.4
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Stayer, W.T.7
-
66
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
Los Alamitos, CA, IEEE Computer Society
-
D.X. Song and A. Perrig, Advanced and authenticated marking schemes for IP traceback, in: Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM-01), Los Alamitos, CA, IEEE Computer Society, 2001, pp. 878-886.
-
(2001)
Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM-01)
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
67
-
-
0344289821
-
Fuzzy information approaches to equipment condition monitoring and diagnosis
-
IEEE Press
-
K. Tomsovic and B. Baer, Fuzzy information approaches to equipment condition monitoring and diagnosis, Electric Power Applications of Fuzzy Systems, IEEE Press, 1998, pp. 59-84.
-
(1998)
Electric Power Applications of Fuzzy Systems
, pp. 59-84
-
-
Tomsovic, K.1
Baer, B.2
-
68
-
-
0036343692
-
Detecting SYN flooding attacks
-
Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Society, Piscataway, NJ, USA
-
H. Wang, D. Zhang and K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Society, Volume 3 of Proceedings IEEE INFOCOM 2002, Piscataway, NJ, USA, 2002, pp. 1530-1539.
-
(2002)
Proceedings IEEE INFOCOM 2002
, vol.3
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
69
-
-
0036051055
-
Sensor fusion using Dempster-Shafer theory
-
Anchorage, AK, USA, IEEE
-
H. Wu, M. Siegel, R. Stiefelhagen and J. Yang, Sensor fusion using Dempster-Shafer theory, in: Proceedings of IEEE Instrumentation and Measurement Technology Conference, Anchorage, AK, USA, IEEE, 2002.
-
(2002)
Proceedings of IEEE Instrumentation and Measurement Technology Conference
-
-
Wu, H.1
Siegel, M.2
Stiefelhagen, R.3
Yang, J.4
|