-
1
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. Computer Communication Review, Vol. 34(2), 39-53, 2004.
-
(2004)
Computer Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
6
-
-
4143081502
-
A covariance analysis model for DDoS attack detection
-
Jin, S., Yeung, Y. D.: A covariance analysis model for DDoS attack detection. In Proceedings of IEEE International Conference on Communications, Vol. 4, 1882-1886, 2004.
-
(2004)
Proceedings of IEEE International Conference on Communications
, vol.4
, pp. 1882-1886
-
-
Jin, S.1
Yeung, Y.D.2
-
8
-
-
8344244591
-
An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition
-
Li, M.: An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition. Computers and Security, Vol. 23(7), 549-558, 2004.
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
-
9
-
-
3142512777
-
Detecting DDoS attack based on network self-similarity
-
Xiang, Y., Lin, Y., Lei, W. L., Huang, S. J.: Detecting DDoS attack based on network self-similarity. IEEE Proceedings Communications, Vol. 151(3), 292-295, 2004.
-
(2004)
IEEE Proceedings Communications
, vol.151
, Issue.3
, pp. 292-295
-
-
Xiang, Y.1
Lin, Y.2
Lei, W.L.3
Huang, S.J.4
-
10
-
-
1642535783
-
A novel approach to detection of "denial-of-service" attacks via adaptive sequential and batch-sequential change-point detection methods
-
Blazek, R., Kim, H., Rozovskii, B., Alexander, T.: A novel approach to detection of "denial-of-service" attacks via adaptive sequential and batch-sequential change-point detection methods. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy
-
-
Blazek, R.1
Kim, H.2
Rozovskii, B.3
Alexander, T.4
-
11
-
-
33745442482
-
Jongsub Moon: A machine learning framework for network anomaly detection using SVM and GA
-
Shon, T., Kim, Y., Lee, C.: Jongsub Moon: A machine learning framework for network anomaly detection using SVM and GA. In Proceedings of Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 176-183, 2005
-
(2005)
Proceedings of Systems, Man and Cybernetics (SMC) Information Assurance Workshop
, pp. 176-183
-
-
Shon, T.1
Kim, Y.2
Lee, C.3
-
12
-
-
84941156304
-
-
http://www.ll.mit.edu/IST/ideval/data/2000/LLS_DDOS_1.0.html
-
-
-
-
13
-
-
0003410292
-
-
Prentice Hall
-
Box, G.E.P., Jenkins, G.M., Reinsel, G.C.: Time Series Analysis: Forecasting and Control, Third edition, Prentice Hall, 1994.
-
(1994)
Time Series Analysis: Forecasting and Control, Third Edition
-
-
Box, G.E.P.1
Jenkins, G.M.2
Reinsel, G.C.3
-
14
-
-
0033906947
-
Fuzzy rule based classification with FeatureSelector and modified threshold accepting
-
Ravi, V., Zimmermann, H. J.: Fuzzy rule based classification with FeatureSelector and modified threshold accepting. European Journal of Operational Research, Vol. 123(1), 16-28, 2000.
-
(2000)
European Journal of Operational Research
, vol.123
, Issue.1
, pp. 16-28
-
-
Ravi, V.1
Zimmermann, H.J.2
|