메뉴 건너뛰기




Volumn 66, Issue 9, 2006, Pages 1137-1151

Collaborative detection and filtering of shrew DDoS attacks using spectral analysis

Author keywords

DDoS attacks; Digital signal processing (DSP); Distributed computing; Grid systems; Hypothesis test; Internet infrastructure; Network security; Packet filtering; Reduction of quality; Statistical spectral analysis

Indexed keywords

COMPUTER SUPPORTED COOPERATIVE WORK; DIGITAL SIGNAL PROCESSING; NATURAL FREQUENCIES; PACKET NETWORKS; QUALITY OF SERVICE; SECURITY SYSTEMS; SPECTRUM ANALYSIS;

EID: 33746985496     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2006.04.007     Document Type: Article
Times cited : (178)

References (25)
  • 1
    • 33746958486 scopus 로고    scopus 로고
    • Abilene-I data set, the Passive Measurement and Analysis (PMA) project, 〈http://pma.nlanr.net/traces/long/ipls1.html〉.
  • 3
    • 20344396650 scopus 로고    scopus 로고
    • M. Attig, J. Lockwood, A framework for rule processing in reconfigurable network systems, in: Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), Napa, CA, 17-20 April, 2005.
  • 4
    • 0141427794 scopus 로고    scopus 로고
    • P. Barford, J. Kline, D. Plonka, A. Ron, A signal analysis of network traffic anomalies, in: Proceedings of ACM Internet Measurement Workshop, Marseille, France, 6-8 November, 2002.
  • 5
    • 33845584261 scopus 로고    scopus 로고
    • Y. Chen, K. Hwang, Collaborative change detection of DDoS attacks on community and ISP networks, in: IEEE International Symposium on Collaboration Technologies and Systems (CTS'06), Las Vegas, NV, 15-17 May, 2006.
  • 6
    • 33751424902 scopus 로고    scopus 로고
    • Y. Chen, K. Hwang, Y.K. Kwok, Filtering of shrew DDoS attacks in frequency domain, in: The First IEEE LCN Workshop on Network Security (WoNS), Sydney, Australia, 15-17 November,2005.
  • 7
    • 0036967463 scopus 로고    scopus 로고
    • C.M. Cheng, H.T. Kung, K.S. Tan, Use of spectral analysis in defense against DoS attacks, Proceedings of 2002 IEEE GLOBECOM, Taipei, China.
  • 8
    • 33847138567 scopus 로고    scopus 로고
    • R. Chertov, S. Fahmy, and N. Shroff, Emulation versus simulation: a case study of TCP-Targeted denial of service attack, in: Proceedings of Second International IEEE CreateNet Conference on Testbeds and Research Infrastructures, March 2006.
  • 9
    • 33746968218 scopus 로고    scopus 로고
    • M. Delio, New Breed of Attack Zombies Lurk, 〈http://www.wired.com/news/technology/0,1282,43697,00.html〉, 31 October, 2005.
  • 10
    • 4243137229 scopus 로고    scopus 로고
    • DETER and EMIST Network Project, Cyber defense technology networking and evaluation, Comm. ACM, 47(3) (2004).
  • 11
    • 33747011224 scopus 로고    scopus 로고
    • GT-ITM: Georgia Tech Internet Topology Models, 〈http://www.cc.gatech.edu/projects/gtitm/〉, 3 November, 2005.
  • 12
    • 25844458510 scopus 로고    scopus 로고
    • M. Guirguis, A. Bestavros, I. Matta, Y. Zhang, Reduction of quality (RoQ) attacks on internet and systems, in: IEEE INFOCOM, Miami, FL, March 2005.
  • 13
    • 33747026795 scopus 로고    scopus 로고
    • A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, ACM SIGCOMM, Karlsruhe, Germany, August 2003.
  • 15
    • 33747018390 scopus 로고    scopus 로고
    • A. Kuzmanovic, E. Knightly, Low-rate TCP-targeted denial of service attacks-the shrew vs. the mice and elephants, in: Proceedings of 2003 ACM SIGCOMM, Karlsruhe, Germany, 25-29 August, 2003.
  • 16
    • 33746961767 scopus 로고    scopus 로고
    • X. Luo, R. Chang, On a new class of pulsing denial-of-service attacks and the defense, in: Proceedings of Network and Distributed System Security Symposium (NDSS'05), San Diego, CA., 2-5 February, 2005.
  • 17
    • 33646909662 scopus 로고    scopus 로고
    • X. Luo, R. Chang, E. Chan, Performance analysis of TCP/AQM under denial-of-service attacks, in: Proceedings of IEEE MASCOTS, Atlanta, GA, September 2005.
  • 18
    • 0035703761 scopus 로고    scopus 로고
    • R. Mahajan, S. Floyd, D. Wetherall, Controlling high-bandwidth flows at the congested router, in: Proceedings of ACM Ninth International Conference on Network Protocols (ICNP), Riverside, CA, 11-14 November, 2001.
  • 19
    • 33746994154 scopus 로고    scopus 로고
    • S. McCanne, S. Floyd, NS-2 Network Simulator, 〈http://www.isi.edu/nsnam/ns/〉, 1997.
  • 20
    • 85084161486 scopus 로고    scopus 로고
    • D. Moore, G. Voelker, S. Savage, Inferring Internet denial-of-service activity, in: Proceedings of 10th USENIX Security Symposium, Washington, DC, August 2001.
  • 21
    • 84942417880 scopus 로고    scopus 로고
    • C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, R. Govindan, COSSACK: coordinated suppression of simultaneous attacks, in: Proceedings of DISCEX III, 2003.
  • 22
    • 0036980251 scopus 로고    scopus 로고
    • C. Partridge, D. Cousins, A. Jackson, R. Krishnan, T. Saxena, W. Strayer, Using signal processing to analyze wireless data traffic, Proceedings of ACM Workshop on Wireless Security, Atlanta, GA, 28-28 September, 2002.
  • 23
    • 33747022569 scopus 로고    scopus 로고
    • V. Paxson, M. Allman, Computing TCP's retransmission timer, Internet RFC 2988, November 2000.
  • 24
    • 33746947055 scopus 로고    scopus 로고
    • S. Specht, R. Lee, Distributed denial of service: taxonomies of attacks, tools and countermeasures, in: Proceedings of 2004 PDCS, San Francisco, CA, 15-17 September, 2004.
  • 25
    • 17744379157 scopus 로고    scopus 로고
    • H. Sun, J. Lui, D. Yau, Defending against low-rate TCP attacks: dynamic detection and protection, in: Proceedings of 2004 IEEE International Conference on Network Protocols (ICNP), Berlin, Germany, 5-8 October, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.