메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 786-793

Filtering of shrew DDoS attacks in frequency domain

Author keywords

Digital signal processing (DSP); Distributed denial of service (DDoS); Internet traffic analysis; Network security; Reduction of quality (RoQ)

Indexed keywords

COMPUTER SOFTWARE; DIGITAL SIGNAL PROCESSING; ELECTRONIC COMMERCE; SERVERS; TELECOMMUNICATION TRAFFIC; WEBSITES;

EID: 33751424902     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2005.70     Document Type: Conference Paper
Times cited : (41)

References (27)
  • 1
    • 0031700563 scopus 로고    scopus 로고
    • Wavelet analysis of long-range-dependent traffic
    • P. Abry and D. Veitch, "Wavelet Analysis of Long-Range-Dependent Traffic," IEEE Trans. Information Theory, vol. 44, no. 1, 1998, pp. 2-15.
    • (1998) IEEE Trans. Information Theory , vol.44 , Issue.1 , pp. 2-15
    • Abry, P.1    Veitch, D.2
  • 5
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • Oct.
    • R. K. Chang, "Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Communications Magazine, Oct. 2002.
    • (2002) IEEE Communications Magazine
    • Chang, R.K.1
  • 8
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • Taipei, China
    • C.-M. Cheng, H. Kung, and K.-S. Tan, "Use of Spectral Analysis in Defense against DoS Attacks," Proc. IEEE GLOBECOM, Taipei, China, 2002.
    • (2002) Proc. IEEE GLOBECOM
    • Cheng, C.-M.1    Kung, H.2    Tan, K.-S.3
  • 9
    • 4243137229 scopus 로고    scopus 로고
    • Cyber defence technology networking and evaluation
    • DETER and EMIST Team Members Mar.
    • DETER and EMIST Team Members, "Cyber Defence Technology Networking and Evaluation," Comm. ACM, vol. 47, no. 3, Mar. 2004, pp. 58-61.
    • (2004) Comm. ACM , vol.47 , Issue.3 , pp. 58-61
  • 17
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks - The shrew vs. the mice and elephants
    • Aug.
    • A. Kuzmanovic and E. W. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks - The Shrew vs. the Mice and Elephants," Proc. ACM SIGCOMM2003, Aug. 2003.
    • (2003) Proc. ACM SIGCOMM2003
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 19
    • 4544388084 scopus 로고    scopus 로고
    • The effect of malicious traffic on the network
    • La Jolla, Apr. 6-8
    • K. C. Lan, A. Hussain, and D. Dutta, "The Effect of Malicious Traffic on the Network," Proc. PAM, La Jolla, Apr. 6-8, 2003.
    • (2003) Proc. PAM
    • Lan, K.C.1    Hussain, A.2    Dutta, D.3
  • 23
    • 33751426782 scopus 로고    scopus 로고
    • NS-2
    • NS-2, http://www.isi.edu/nsnam/ns/, 2004.
    • (2004)
  • 25
    • 0003273441 scopus 로고    scopus 로고
    • Computing TCP's retransmission timer
    • Nov.
    • V. Paxson and M. Allman, "Computing TCP's Retransmission Timer," Internet RFC 2988, Nov. 2000.
    • (2000) Internet RFC , vol.2988
    • Paxson, V.1    Allman, M.2
  • 26
    • 85132972574 scopus 로고    scopus 로고
    • Distributed denial of service: Taxonomies of attacks, tools and countermeasures
    • Sept. 18
    • S. M. Specht and R. B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures," Proc. PDCS, Sept. 18, 2004.
    • (2004) Proc. PDCS
    • Specht, S.M.1    Lee, R.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.