메뉴 건너뛰기




Volumn 37, Issue 2, 2007, Pages 157-169

Covariance-matrix modeling and detecting various flooding attacks

Author keywords

Covariance matrix; Flooding attacks; Second order feature; Statistical anomaly detection; Threshold matrix

Indexed keywords

COVARIANCE MATRIX; DISTRIBUTED COMPUTER SYSTEMS; HEURISTIC METHODS; MATHEMATICAL MODELS; STATISTICAL METHODS;

EID: 33947660479     PISSN: 10834427     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCA.2006.889480     Document Type: Article
Times cited : (71)

References (36)
  • 1
    • 0036804084 scopus 로고    scopus 로고
    • "Defending against flooding based distributed denial-of-service attacks: A tutorial"
    • Oct
    • R. K. C. Chang, "Defending against flooding based distributed denial-of-service attacks: A tutorial," IEEE Commun. Mag., vol. 40, no. 10, pp. 42-51, Oct. 2002.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 2
    • 0023294428 scopus 로고
    • "An intrusion-detection model"
    • Feb
    • D. E. Denning, "An intrusion-detection model," IEEE Trans. Softw. Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 3
    • 0003964874 scopus 로고
    • "Next-generation intrusion detection expert system (NIDES): A summary"
    • SRI Int., Menlo Park, CA, Tech. Rep. SRI-CSL-97-07
    • D. Anderson, T. Frivold, and A. Valdes, "Next-generation intrusion detection expert system (NIDES): A summary," SRI Int., Menlo Park, CA, Tech. Rep. SRI-CSL-97-07, 1995.
    • (1995)
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 4
    • 0004118981 scopus 로고
    • "The NIDES statistical component description of justification"
    • SRI Int., Menlo Park, CA, Tech. Rep. A010
    • H. S. Javitz and A. Valdes, "The NIDES statistical component description of justification," SRI Int., Menlo Park, CA, Tech. Rep. A010, 1994.
    • (1994)
    • Javitz, H.S.1    Valdes, A.2
  • 6
    • 0036647172 scopus 로고    scopus 로고
    • "Multivariate statistical analysis of audit trails for host-based intrusion detection"
    • Jul
    • N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate statistical analysis of audit trails for host-based intrusion detection," IEEE Trans. Comput., vol. 51, no. 7, pp. 810-820, Jul. 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 7
    • 84942256107 scopus 로고    scopus 로고
    • "Statistical approaches to DDoS attack detection and response"
    • in Apr
    • L. Feinstein and D. Schnackenberg, "Statistical approaches to DDoS attack detection and response," in Proc. DISCEX, Apr. 2003, vol. 1, pp. 303-314.
    • (2003) Proc. DISCEX , vol.1 , pp. 303-314
    • Feinstein, L.1    Schnackenberg, D.2
  • 8
    • 0036804085 scopus 로고    scopus 로고
    • "Network intrusion and fault detection: A statistical anomaly approach"
    • Oct
    • C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach," IEEE Commun. Mag., vol. 40, no. 10, pp. 76-82, Oct. 2002.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 9
    • 4143081502 scopus 로고    scopus 로고
    • "A covariance analysis model for DDoS attack detection"
    • in Jun
    • S. Jin and D. Yeung, "A covariance analysis model for DDoS attack detection," in Proc. IEEE ICC, Jun. 2004, vol. 4, pp. 20-24.
    • (2004) Proc. IEEE ICC , vol.4 , pp. 20-24
    • Jin, S.1    Yeung, D.2
  • 10
    • 1642535783 scopus 로고    scopus 로고
    • "A novel approach to detection of denial-of-service attacks via adaptive sequential and batch-sequential change-point detection methods"
    • in Jun
    • R. B. Blazek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A novel approach to detection of denial-of-service attacks via adaptive sequential and batch-sequential change-point detection methods," in Proc. Workshop Stat. and Mach. Learn. Tech. Comput. Intrusion Detect., Jun. 2001, pp. 220-226.
    • (2001) Proc. Workshop Stat. and Mach. Learn. Tech. Comput. Intrusion Detect. , pp. 220-226
    • Blazek, R.B.1    Kim, H.2    Rozovskii, B.3    Tartakovsky, A.4
  • 11
    • 0043166339 scopus 로고    scopus 로고
    • "Anomaly detection in IP networks"
    • Aug
    • M. Thottan and C. Ji, "Anomaly detection in IP networks," IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 12
    • 14644397228 scopus 로고    scopus 로고
    • "Change-point monitoring for the detection of DoS attacks"
    • Oct.-Dec
    • H. Wang, D. Zhang, and K. G. Shin, "Change-point monitoring for the detection of DoS attacks," IEEE Trans. Dependable Secur. Comput., vol. 1, no. 4, pp. 193-208, Oct.-Dec. 2004.
    • (2004) IEEE Trans. Dependable Secur. Comput. , vol.1 , Issue.4 , pp. 193-208
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 13
    • 84885774862 scopus 로고    scopus 로고
    • "A framework for constructing features and models for intrusion detection systems"
    • Nov
    • W. Lee and S. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, Nov. 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 14
    • 0013458787 scopus 로고    scopus 로고
    • "Sustaining availability of Web services under severe denial of service attacks"
    • Georgia Inst. Technol., Atlanta, GA, Tech. Rep. GITCC-01-10, May
    • J. Xu, "Sustaining availability of Web services under severe denial of service attacks," Georgia Inst. Technol., Atlanta, GA, Tech. Rep. GITCC-01-10, May 2001.
    • (2001)
    • Xu, J.1
  • 15
    • 0004204719 scopus 로고    scopus 로고
    • "A data mining framework for constructing features and models for intrusion detection systems"
    • Ph.D. dissertation, Columbia Univ., New York
    • W. Lee, "A data mining framework for constructing features and models for intrusion detection systems," Ph.D. dissertation, Columbia Univ., New York, 1999.
    • (1999)
    • Lee, W.1
  • 16
    • 35248857893 scopus 로고    scopus 로고
    • "An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection"
    • in Oct
    • M. V. Mahoney and P. K. Chan, "An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection," in Proc. RAID, Oct. 2003, pp. 220-237.
    • (2003) Proc. RAID , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 17
    • 2942751146 scopus 로고    scopus 로고
    • "Experiences with specification-based intrusion detection"
    • in Oct
    • P. Uppuluri and R. Sekar, "Experiences with specification-based intrusion detection," in Proc. RAID, Oct. 2001, pp. 172-189.
    • (2001) Proc. RAID , pp. 172-189
    • Uppuluri, P.1    Sekar, R.2
  • 20
    • 85084161486 scopus 로고    scopus 로고
    • "Inferring internet denial of service activity"
    • in Aug
    • D. Moore, G. Voelker, and S. Savage, "Inferring internet denial of service activity," in Proc. USENIX Secur. Symp., Aug. 2001, pp. 9-22.
    • (2001) Proc. USENIX Secur. Symp. , pp. 9-22
    • Moore, D.1    Voelker, G.2    Savage, S.3
  • 21
    • 15044352886 scopus 로고    scopus 로고
    • "Theorems and fallacies in the theory of long-range-dependent processes"
    • Mar
    • J. A. Gubner, "Theorems and fallacies in the theory of long-range-dependent processes," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 1234-1239, Mar. 2005.
    • (2005) IEEE Trans. Inf. Theory , vol.51 , Issue.3 , pp. 1234-1239
    • Gubner, J.A.1
  • 22
    • 6944226924 scopus 로고    scopus 로고
    • "Long-range dependence ten years of Internet traffic modelling"
    • Sep./Oct
    • T. Karagiannis, M. Molle, and M. Faloutsos, "Long-range dependence ten years of Internet traffic modelling," IEEE Internet Comput., vol. 8, no. 5, pp. 57-64, Sep./Oct. 2004.
    • (2004) IEEE Internet Comput. , vol.8 , Issue.5 , pp. 57-64
    • Karagiannis, T.1    Molle, M.2    Faloutsos, M.3
  • 24
    • 0035402092 scopus 로고    scopus 로고
    • "On the defense of the distributed denial of service attacks: An on-off feedback control approach"
    • Jul
    • Y. Xiong, S. Liu, and P. Sun, "On the defense of the distributed denial of service attacks: An on-off feedback control approach," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 282-293, Jul. 2001.
    • (2001) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.31 , Issue.4 , pp. 282-293
    • Xiong, Y.1    Liu, S.2    Sun, P.3
  • 25
    • 0038052872 scopus 로고    scopus 로고
    • "Random flow network modeling and simulations for DdoS attack mitigation"
    • in May
    • J. Kong, M. Mirza, J. Shu, C. Yoedhana, M. Gerla, and S. Lu, "Random flow network modeling and simulations for DdoS attack mitigation," in Proc. IEEE ICC, May 2003, vol. 1, pp. 487-491.
    • (2003) Proc. IEEE ICC , vol.1 , pp. 487-491
    • Kong, J.1    Mirza, M.2    Shu, J.3    Yoedhana, C.4    Gerla, M.5    Lu, S.6
  • 26
    • 0032178150 scopus 로고    scopus 로고
    • "High speed policy-based packet forwarding using efficient multi-dimensional range matching"
    • in Sep
    • T. V. Lakshman and D. Stiliadis, "High speed policy-based packet forwarding using efficient multi-dimensional range matching," in Proc. ACM SIGCOMM, Sep. 1998, pp. 203-214.
    • (1998) Proc. ACM SIGCOMM , pp. 203-214
    • Lakshman, T.V.1    Stiliadis, D.2
  • 27
    • 77953077374 scopus 로고    scopus 로고
    • "Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites"
    • in Honolulu, HI, May
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites," in Proc. 11th Int. World Wide Web Conf., Honolulu, HI, May 2002, pp. 252-262.
    • (2002) Proc. 11th Int. World Wide Web Conf. , pp. 252-262
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 28
    • 18144375196 scopus 로고    scopus 로고
    • "Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically"
    • in Nov./Dec
    • Y. Ohsita, S. Ata, and M. Murata, "Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically," in Proc. IEEE GLOBECOM, Nov./Dec. 2004, vol. 4, pp. 2043-2049.
    • (2004) Proc. IEEE GLOBECOM , vol.4 , pp. 2043-2049
    • Ohsita, Y.1    Ata, S.2    Murata, M.3
  • 29
    • 0037209446 scopus 로고    scopus 로고
    • "Host-based intrusion detection using dynamic and static behavioral models"
    • Jan
    • D. Y. Yeung and Y. X. Ding, "Host-based intrusion detection using dynamic and static behavioral models," Pattern Recognit., vol. 36, no. 1, pp. 229-243, Jan. 2003.
    • (2003) Pattern Recognit. , vol.36 , Issue.1 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.X.2
  • 31
    • 77958468530 scopus 로고    scopus 로고
    • "Supporting intrusion detection by graph clustering and graph drawing"
    • in Oct
    • J. Toelle and O. Niggenmann, "Supporting intrusion detection by graph clustering and graph drawing," in Proc. 3rd Int. Workshop RAID, Oct. 2000.
    • (2000) Proc. 3rd Int. Workshop RAID
    • Toelle, J.1    Niggenmann, O.2
  • 35
    • 75449090970 scopus 로고
    • 2nd ed. Cambridge, U.K.: Cambridge Univ. Press, ch. 2.17 and 5.8, 123
    • G. H. Hardy, J. E. Littlewood, and G. Pólya, Chebychef's Inequality, 2nd ed. Cambridge, U.K.: Cambridge Univ. Press, 1988, ch. 2.17 and 5.8, pp. 43-45. 123.
    • (1988) Chebychef's Inequality , pp. 43-45
    • Hardy, G.H.1    Littlewood, J.E.2    Pólya, G.3
  • 36
    • 33947622776 scopus 로고    scopus 로고
    • "Using MIB II variables for network anomaly detection - A feasibility study"
    • in Philadelphia, PA, Nov
    • X. Qin, W. Lee, L. Lewis, and J. B. D. Cabrera, "Using MIB II variables for network anomaly detection - A feasibility study," in Proc. ACM Workshop Data Mining Secur. Appl., Philadelphia, PA, Nov. 2001, pp. 609-622.
    • (2001) Proc. ACM Workshop Data Mining Secur. Appl. , pp. 609-622
    • Qin, X.1    Lee, W.2    Lewis, L.3    Cabrera, J.B.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.