메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 401-410

Collaborative change detection of DDoS attacks on community and ISP networks

Author keywords

Collaboration grids; Collaborative change point detection; Community networks; DDoS attacks; Internet infrastructure; Internet service provider; Network security; Peer to peer systems

Indexed keywords

CHANGE-AGGREGATION TREE (CAT); COLLABORATION GRIDS; COLLABORATIVE CHANGE-POINT DETECTION; COMMUNITY NETWORKS; DDOS ATTACKS; INTERNET INFRASTRUCTURE; INTERNET SERVICE PROVIDER; NETWORK SECURITY; PEER-TO-PEER SYSTEMS;

EID: 33845584261     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CTS.2006.27     Document Type: Conference Paper
Times cited : (42)

References (28)
  • 3
    • 14844318430 scopus 로고    scopus 로고
    • Berman, F., G. Fox, and A. Hey (editors), John Wiley, U.K
    • Berman, F., G. Fox, and A. Hey (editors), GRID COMPUTING, John Wiley, U.K., 2003.
    • (2003) Grid Computing
  • 4
    • 84860047021 scopus 로고    scopus 로고
    • Cooperation in internet data acquisition and analysis
    • Cambridge, MA., Sept.
    • Monk, T. and K. Claffy, "Cooperation in Internet Data Acquisition and Analysis," Coordination and Administration of the Internet Workshop, Cambridge, MA., Sept. 1996. (CAIDA Project, http://www.caida.org/)
    • (1996) Coordination and Administration of the Internet Workshop
    • Monk, T.1    Claffy, K.2
  • 5
    • 33845590230 scopus 로고    scopus 로고
    • Hybrid intrusion and anomaly detection with weighted signature generation
    • revised Sept.
    • Cai, M., K. Hwang and Y. Chen, "Hybrid Intrusion and Anomaly Detection with Weighted Signature Generation", IEEE Trans. On Dependable and Secure Computing, revised Sept. 2005.
    • (2005) IEEE Trans. on Dependable and Secure Computing
    • Cai, M.1    Hwang, K.2    Chen, Y.3
  • 7
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks with spectral analysis
    • Chen, Y. and K. Hwang, "Collaborative Detection and Filtering of Shrew DDoS Attacks with Spectral Analysis", Journal of Parallel and Distributed Computing, 2006.
    • (2006) Journal of Parallel and Distributed Computing
    • Chen, Y.1    Hwang, K.2
  • 8
    • 33845584172 scopus 로고    scopus 로고
    • Defense against internet worms and DDoS attacks with dynamic hardware and network processors
    • Chapter 13 edited by R. Lee and S. Smith, Morgan Kaufmann
    • Chen, Y., M. Cai, and K. Hwang, "Defense against Internet Worms and DDoS Attacks with Dynamic Hardware and Network Processors", Chapter 13 in HARDWARE-BASED SECURITY, edited by R. Lee and S. Smith, Morgan Kaufmann, 2006
    • (2006) Hardware-based Security
    • Chen, Y.1    Cai, M.2    Hwang, K.3
  • 9
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • November
    • Chakrabarti, A. and G. Manimaran, "Internet Infrastructure Security: A Taxonomy", IEEE Network, November 2002.
    • (2002) IEEE Network
    • Chakrabarti, A.1    Manimaran, G.2
  • 12
    • 9944219878 scopus 로고    scopus 로고
    • Peer-to-peer grids
    • Chapter 18 edited by Berman Fox, and Hey, Wiley
    • Fox, G., et al, "Peer-to-Peer Grids", Chapter 18 in GRID COMPUTING, edited by Berman Fox, and Hey, Wiley, 2003, pp.471-490.
    • (2003) Grid Computing , pp. 471-490
    • Fox, G.1
  • 16
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial-of-service attacks: Characterization and implications for CDNs and web sites
    • ACM Press
    • Jung, J., B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial-of-Service Attacks: Characterization and Implications for CDNs and Web Sites," Proc. of Int'l World Wide Web Conference, ACM Press, 2002.
    • (2002) Proc. of Int'l World Wide Web Conference
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 17
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks - The shrew vs. the mice and elephants
    • Aug.
    • Kuzmanovic, A. and E. W. Knightly, "Low-Rate TCP-Targeted Denial of Service Attacks - The Shrew vs. the Mice and Elephants," Proc. of ACM SIGCOMM 2003, Aug. 2003
    • (2003) Proc. of ACM SIGCOMM 2003
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 20
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • July
    • Mirkovic, J. and P. Reiher, "D-WARD: A Source-End Defense Against Flooding Denial-of-Service Attacks," IEEE Trans. on Dependable and Secure Computing, Vol. 2, No. 3, July 2005, pp. 216-232
    • (2005) IEEE Trans. on Dependable and Secure Computing , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 24
    • 38049152816 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks by sharing distributed beliefs
    • LNCS 2727
    • Peng, T., C. Leckie, and K. Ramamohanarao, "Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs," ACISP 2003, LNCS 2727, pp.214-225, 2003.
    • (2003) ACISP 2003 , pp. 214-225
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 25
    • 84878737375 scopus 로고    scopus 로고
    • Combining filtering and statistical methods for anomaly detection
    • Berkeley, CA. Oct. 19-21
    • Soule, A., K. Salamatian, and N. Taft, "Combining Filtering and Statistical Methods for Anomaly Detection," Proc. of ACM Internet Measurement Conf. Berkeley, CA. Oct. 19-21, 2005.
    • (2005) Proc. of ACM Internet Measurement Conf.
    • Soule, A.1    Salamatian, K.2    Taft, N.3
  • 28
    • 33847114017 scopus 로고    scopus 로고
    • Trust-preserving overlay networks for global reputation aggregation in scalable P2P grids
    • Rhodes Island, Greece, April 25-28
    • Zhou, R. and K. Hwang, "Trust-Preserving Overlay Networks for Global Reputation Aggregation in Scalable P2P Grids", IEEE Parallel and Distributed Processing Symposium (IPDPS-2206), Rhodes Island, Greece, April 25-28, 2006..
    • (2006) IEEE Parallel and Distributed Processing Symposium (IPDPS-2206)
    • Zhou, R.1    Hwang, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.