-
1
-
-
33746958486
-
-
Abilene-I data set, the Passive Measurement and Analysis (PMA) project, 〈http://pma.nlanr.net/traces/long/ipls1.html〉.
-
-
-
-
2
-
-
27744442107
-
-
Wiley, New York
-
Allen R., and Mills D. Signal analysis: Time, Frequency, Scale, and Structure (2004), Wiley, New York
-
(2004)
Signal analysis: Time, Frequency, Scale, and Structure
-
-
Allen, R.1
Mills, D.2
-
3
-
-
20344396650
-
-
M. Attig, J. Lockwood, A framework for rule processing in reconfigurable network systems, in: Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), Napa, CA, 17-20 April, 2005.
-
-
-
-
4
-
-
0141427794
-
-
P. Barford, J. Kline, D. Plonka, A. Ron, A signal analysis of network traffic anomalies, in: Proceedings of ACM Internet Measurement Workshop, Marseille, France, 6-8 November, 2002.
-
-
-
-
5
-
-
33845584261
-
-
Y. Chen, K. Hwang, Collaborative change detection of DDoS attacks on community and ISP networks, in: IEEE International Symposium on Collaboration Technologies and Systems (CTS'06), Las Vegas, NV, 15-17 May, 2006.
-
-
-
-
6
-
-
33751424902
-
-
Y. Chen, K. Hwang, Y.K. Kwok, Filtering of shrew DDoS attacks in frequency domain, in: The First IEEE LCN Workshop on Network Security (WoNS), Sydney, Australia, 15-17 November,2005.
-
-
-
-
7
-
-
0036967463
-
-
C.M. Cheng, H.T. Kung, K.S. Tan, Use of spectral analysis in defense against DoS attacks, Proceedings of 2002 IEEE GLOBECOM, Taipei, China.
-
-
-
-
8
-
-
33847138567
-
-
R. Chertov, S. Fahmy, and N. Shroff, Emulation versus simulation: a case study of TCP-Targeted denial of service attack, in: Proceedings of Second International IEEE CreateNet Conference on Testbeds and Research Infrastructures, March 2006.
-
-
-
-
9
-
-
33746968218
-
-
M. Delio, New Breed of Attack Zombies Lurk, 〈http://www.wired.com/news/technology/0,1282,43697,00.html〉, 31 October, 2005.
-
-
-
-
10
-
-
4243137229
-
-
DETER and EMIST Network Project, Cyber defense technology networking and evaluation, Comm. ACM, 47(3) (2004).
-
-
-
-
11
-
-
33747011224
-
-
GT-ITM: Georgia Tech Internet Topology Models, 〈http://www.cc.gatech.edu/projects/gtitm/〉, 3 November, 2005.
-
-
-
-
12
-
-
25844458510
-
-
M. Guirguis, A. Bestavros, I. Matta, Y. Zhang, Reduction of quality (RoQ) attacks on internet and systems, in: IEEE INFOCOM, Miami, FL, March 2005.
-
-
-
-
13
-
-
33747026795
-
-
A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, ACM SIGCOMM, Karlsruhe, Germany, August 2003.
-
-
-
-
14
-
-
33646476351
-
Security binding and worm/DDoS defense for trusted grid computing
-
Hwang K., Kwok Y.-K., Song S., Cai M., Chen Y., and Chen Y. Security binding and worm/DDoS defense for trusted grid computing. Internat. J. Critical Infrastructures 2 4 (2005)
-
(2005)
Internat. J. Critical Infrastructures
, vol.2
, Issue.4
-
-
Hwang, K.1
Kwok, Y.-K.2
Song, S.3
Cai, M.4
Chen, Y.5
Chen, Y.6
-
15
-
-
33747018390
-
-
A. Kuzmanovic, E. Knightly, Low-rate TCP-targeted denial of service attacks-the shrew vs. the mice and elephants, in: Proceedings of 2003 ACM SIGCOMM, Karlsruhe, Germany, 25-29 August, 2003.
-
-
-
-
16
-
-
33746961767
-
-
X. Luo, R. Chang, On a new class of pulsing denial-of-service attacks and the defense, in: Proceedings of Network and Distributed System Security Symposium (NDSS'05), San Diego, CA., 2-5 February, 2005.
-
-
-
-
17
-
-
33646909662
-
-
X. Luo, R. Chang, E. Chan, Performance analysis of TCP/AQM under denial-of-service attacks, in: Proceedings of IEEE MASCOTS, Atlanta, GA, September 2005.
-
-
-
-
18
-
-
0035703761
-
-
R. Mahajan, S. Floyd, D. Wetherall, Controlling high-bandwidth flows at the congested router, in: Proceedings of ACM Ninth International Conference on Network Protocols (ICNP), Riverside, CA, 11-14 November, 2001.
-
-
-
-
19
-
-
33746994154
-
-
S. McCanne, S. Floyd, NS-2 Network Simulator, 〈http://www.isi.edu/nsnam/ns/〉, 1997.
-
-
-
-
20
-
-
85084161486
-
-
D. Moore, G. Voelker, S. Savage, Inferring Internet denial-of-service activity, in: Proceedings of 10th USENIX Security Symposium, Washington, DC, August 2001.
-
-
-
-
21
-
-
84942417880
-
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, R. Govindan, COSSACK: coordinated suppression of simultaneous attacks, in: Proceedings of DISCEX III, 2003.
-
-
-
-
22
-
-
0036980251
-
-
C. Partridge, D. Cousins, A. Jackson, R. Krishnan, T. Saxena, W. Strayer, Using signal processing to analyze wireless data traffic, Proceedings of ACM Workshop on Wireless Security, Atlanta, GA, 28-28 September, 2002.
-
-
-
-
23
-
-
33747022569
-
-
V. Paxson, M. Allman, Computing TCP's retransmission timer, Internet RFC 2988, November 2000.
-
-
-
-
24
-
-
33746947055
-
-
S. Specht, R. Lee, Distributed denial of service: taxonomies of attacks, tools and countermeasures, in: Proceedings of 2004 PDCS, San Francisco, CA, 15-17 September, 2004.
-
-
-
-
25
-
-
17744379157
-
-
H. Sun, J. Lui, D. Yau, Defending against low-rate TCP attacks: dynamic detection and protection, in: Proceedings of 2004 IEEE International Conference on Network Protocols (ICNP), Berlin, Germany, 5-8 October, 2004.
-
-
-
|