메뉴 건너뛰기




Volumn 10, Issue 1, 2006, Pages 82-89

Denial-of-service attack-detection techniques

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER CRIME; INFORMATION SERVICES; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 31544436627     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2006.5     Document Type: Article
Times cited : (365)

References (14)
  • 1
    • 85084161486 scopus 로고    scopus 로고
    • "Inferring Internet Denial-of-Service Activity"
    • Usenix Assoc.
    • D. Moore, G.M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," Proc. Usenix Security Symp., Usenix Assoc., 2001; http://citeseer.ist.psu.edu/moore01inferring.html.
    • (2001) Proc. Usenix Security Symp.
    • Moore, D.1    Voelker, G.M.2    Savage, S.3
  • 4
    • 11144272176 scopus 로고    scopus 로고
    • "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms"
    • J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," ACM Sigcomm Computer Comm. Rev., vol. 34, no. 2, 2004, pp. 39-53.
    • (2004) ACM Sigcomm Computer Comm. Rev. , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 5
    • 0038742365 scopus 로고    scopus 로고
    • "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites"
    • ACM Press
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites," Proc. Int'l World Wide Web Conference, ACM Press, 2002, pp. 252-262.
    • (2002) Proc. Int'l World Wide Web Conference , pp. 252-262
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 7
    • 84942256107 scopus 로고    scopus 로고
    • "Statistical Approaches to DDoS Attack Detection and Response"
    • IEEE CS Press
    • L Feinstein et al., "Statistical Approaches to DDoS Attack Detection and Response," Proc. DARPA Information Survivability Conf. and Exposition, vol. 1, 2003, IEEE CS Press, pp. 303-314.
    • (2003) Proc. DARPA Information Survivability Conf. and Exposition , vol.1 , pp. 303-314
    • Feinstein, L.1
  • 8
    • 1642535783 scopus 로고    scopus 로고
    • "A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods"
    • IEEE CS Press
    • R.B. Blazek et al., "A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," Proc. IEEE Workshop Information Assurance and Security, IEEE CS Press, 2001, pp. 220-226.
    • (2001) Proc. IEEE Workshop Information Assurance and Security , pp. 220-226
    • Blazek, R.B.1
  • 11
    • 3543096392 scopus 로고    scopus 로고
    • "Fast Portscan Detection Using Sequential Hypothesis Testing"
    • IEEE CS Press
    • J. Jung et al., "Fast Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2004, pp. 211-225.
    • (2004) Proc. IEEE Symp. Security and Privacy , pp. 211-225
    • Jung, J.1
  • 12
  • 14
    • 0034301517 scopus 로고    scopus 로고
    • "The 1999 DARPA Off-Line Intrusion Detection Evaluation"
    • R. Lippmann et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation," Computer Networks, vol. 34, no. 4, 2000, pp. 579-595.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.