메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 1701-1705

Mark-aided distributed filtering by using neural network for DDoS defense

Author keywords

DDoS; Filtering; Neural network; Packet marking; Traceback

Indexed keywords

BANDWIDTH; COMPUTER CRIME; INTERNET; NETWORK PROTOCOLS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33846606858     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2005.1577940     Document Type: Conference Paper
Times cited : (21)

References (28)
  • 1
    • 3042825073 scopus 로고    scopus 로고
    • IP Traceback: A New Denial-of-Service Deterrent?
    • H. Aljifri, "IP Traceback: A New Denial-of-Service Deterrent?", IEEE Security & Privacy, Vol.1, No.3, 2003, pp.24-31.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.3 , pp. 24-31
    • Aljifri, H.1
  • 2
    • 2442583303 scopus 로고    scopus 로고
    • The LoSS Technique for Detecting New Denial of Service Attacks
    • W. H. Allen, G. A. Marin, "The LoSS Technique for Detecting New Denial of Service Attacks", Proc. of IEEE SoutheastCon 2004, pp.302-309.
    • (2004) Proc. of IEEE SoutheastCon , pp. 302-309
    • Allen, W.H.1    Marin, G.A.2
  • 4
    • 0038059205 scopus 로고    scopus 로고
    • IP Traceback With Deterministic Packet Marking
    • A. Belenky, and N. Ansari, "IP Traceback With Deterministic Packet Marking", IEEE Communications Letters, Vol.7, No.4, 2003, pp.162-164.
    • (2003) IEEE Communications Letters , vol.7 , Issue.4 , pp. 162-164
    • Belenky, A.1    Ansari, N.2
  • 7
    • 33744807509 scopus 로고    scopus 로고
    • Simulation of Distributed Denial of Service Attacks
    • TR C4/09, School of Information Technology, Deakin University, Australia
    • R. C. Chen, W. Shi, and W. Zhou, "Simulation of Distributed Denial of Service Attacks", technical report, TR C4/09, School of Information Technology, Deakin University, Australia, 2004.
    • (2004) technical report
    • Chen, R.C.1    Shi, W.2    Zhou, W.3
  • 8
    • 33846568804 scopus 로고    scopus 로고
    • Computer Emergency Response Team, CERT
    • Computer Emergency Response Team, CERT, http://www.cert.org.
  • 15
    • 0842310839 scopus 로고    scopus 로고
    • Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking
    • Y. Kim J.-Y. Jo, F. L. Merat, "Defeating Distributed Denial-of-Service Attack with Deterministic Bit Marking", IEEE GLOBECOM 2003, pp.1363-1367.
    • (2003) IEEE GLOBECOM , pp. 1363-1367
    • Kim, Y.1    Jo, J.-Y.2    Merat, F.L.3
  • 17
    • 0003993827 scopus 로고    scopus 로고
    • MIT, Data Set
    • MIT 1998 DARPA Intrusion Detection Evaluation Data Set, http://www.ll.mit.edu/IST/ideval/data/198/198_data_index.html
    • (1998) DARPA Intrusion Detection Evaluation
  • 18
    • 0000783098 scopus 로고
    • Optimal detection of a change in distribution
    • M. Pollak, "Optimal detection of a change in distribution", Ann. Statist., Vol. 13, 1986, pp. 206-227.
    • (1986) Ann. Statist , vol.13 , pp. 206-227
    • Pollak, M.1
  • 22
    • 85084163540 scopus 로고    scopus 로고
    • CenterTrack: An IP Overlay Network for Tracking DoS Floods
    • R. Stone, "CenterTrack: An IP Overlay Network for Tracking DoS Floods", 9th Usenix Security Symposium, 2000, pp.199-212.
    • (2000) 9th Usenix Security Symposium , pp. 199-212
    • Stone, R.1
  • 26
  • 27
    • 0008922435 scopus 로고    scopus 로고
    • The XenoService A Distributed Defeat for Distributed Denial of Service
    • J. Yan, S. Early, R. Anderson, "The XenoService A Distributed Defeat for Distributed Denial of Service", Proc. of ISW 2000.
    • (2000) Proc. of ISW
    • Yan, J.1    Early, S.2    Anderson, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.