메뉴 건너뛰기




Volumn , Issue , 2006, Pages 507-518

Vanguard: A new detection scheme for a class of TCP-targeted denial-of-service attacks

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; DATA TRANSFER; INTERNET; INTRUSION DETECTION; TRANSMISSION CONTROL PROTOCOL;

EID: 34250739801     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (44)
  • 2
    • 34250696306 scopus 로고    scopus 로고
    • X. Yang and D. Wetherall and T. Anderson. A DoS-limiting network architecture. In Proc. ACM SIGCOMM, 2005.
    • X. Yang and D. Wetherall and T. Anderson. A DoS-limiting network architecture. In Proc. ACM SIGCOMM, 2005.
  • 3
    • 34250742915 scopus 로고    scopus 로고
    • D. Dittrich. http://staff.washington.edu/dittrich/misc/ddos/.
    • Dittrich, D.1
  • 6
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • C. Estan, S. Savage, and G. Varghese. Automatically inferring patterns of resource consumption in network traffic. In Proc. ACM SIGCOMM, 2003.
    • (2003) Proc. ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 9
    • 1642535783 scopus 로고    scopus 로고
    • A novel approach to detection of denial of service attacks via adaptive sequential and batch-sequential change-point detection methods
    • June
    • R. Blazek, H. Kirn, B. Rozovskii, and A. Tartakovsky. A novel approach to detection of denial of service attacks via adaptive sequential and batch-sequential change-point detection methods. In Proc. IEEE Workshop Information Assurance and Security, June 2001.
    • (2001) Proc. IEEE Workshop Information Assurance and Security
    • Blazek, R.1    Kirn, H.2    Rozovskii, B.3    Tartakovsky, A.4
  • 10
    • 34250725228 scopus 로고    scopus 로고
    • On-line detection of distributed attacks from space-time network flow patterns
    • J. Baras, A. Cardenas, and V. Ramezani. On-line detection of distributed attacks from space-time network flow patterns. In Proc. 23rd Army Science Conf., 2002.
    • (2002) Proc. 23rd Army Science Conf
    • Baras, J.1    Cardenas, A.2    Ramezani, V.3
  • 14
    • 33745278421 scopus 로고    scopus 로고
    • Engineering of a global defense infrastructure for DDoS attacks
    • Aug
    • K. Wan and R. Chang. Engineering of a global defense infrastructure for DDoS attacks. In Proc. of IEEE Intl. Conf. Networks, pages 419-127, Aug. 2002.
    • (2002) Proc. of IEEE Intl. Conf. Networks , pp. 419-127
    • Wan, K.1    Chang, R.2
  • 15
    • 0037860750 scopus 로고    scopus 로고
    • Detecting denial of service attacks using support vector machines
    • S. Mukkamala and A. Sung. Detecting denial of service attacks using support vector machines. In Proc. of IEEE Intl. Conf. Fuzzy Systems, volume 2, pages 1231-1236, 2003.
    • (2003) Proc. of IEEE Intl. Conf. Fuzzy Systems , vol.2 , pp. 1231-1236
    • Mukkamala, S.1    Sung, A.2
  • 16
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • Oct
    • C. Manikopoulos and S. Papavassiliou. Network intrusion and fault detection: a statistical anomaly approach. IEEE Communications Magazine, 40(10):76-82, Oct. 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 18
    • 34250726367 scopus 로고    scopus 로고
    • A. Hussain and J. Heidemann and C. Papadopoulos. A framework for classifying denial of service attacks. In Proc. ACM SIGCOMM, 2003.
    • A. Hussain and J. Heidemann and C. Papadopoulos. A framework for classifying denial of service attacks. In Proc. ACM SIGCOMM, 2003.
  • 19
    • 8344224137 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks (the shrew vs. the mice and elephants)
    • Aug
    • A. Kuzmanovic and E. Knightly. Low-rate TCP-targeted denial of service attacks (the shrew vs. the mice and elephants). In Proc. ACM SIGCOMM, Aug. 2003.
    • (2003) Proc. ACM SIGCOMM
    • Kuzmanovic, A.1    Knightly, E.2
  • 20
    • 17744369470 scopus 로고    scopus 로고
    • Exploiting the transients of adaptation for RoQ attacks on Internet resources
    • M. Guirguis, A. Bestavros, and I. Matta. Exploiting the transients of adaptation for RoQ attacks on Internet resources. In Proc. IEEE ICNP, 2004.
    • (2004) Proc. IEEE ICNP
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3
  • 22
    • 25844492549 scopus 로고    scopus 로고
    • On the effectiveness of DDoS attacks on statistical filtering
    • Q. Li, E. Chang, and M. Chan. On the effectiveness of DDoS attacks on statistical filtering. In Proc. IEEE INFOCOM, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Li, Q.1    Chang, E.2    Chan, M.3
  • 23
    • 0003973018 scopus 로고    scopus 로고
    • Computing TCP's retransmission timer. RFC 2988
    • Nov
    • V. Paxson and M. Allman. Computing TCP's retransmission timer. RFC 2988, Nov. 2000.
    • (2000)
    • Paxson, V.1    Allman, M.2
  • 24
    • 33751433491 scopus 로고    scopus 로고
    • Defending against low-rate TCP attack: Dynamic detection and protection
    • H. Sun, J. Lui, and D. Yau. Defending against low-rate TCP attack: Dynamic detection and protection. In Proc. IEEE ICNP, 2004.
    • (2004) Proc. IEEE ICNP
    • Sun, H.1    Lui, J.2    Yau, D.3
  • 25
    • 33847113121 scopus 로고    scopus 로고
    • Collaborative defense against periodic Shrew DDoS attacks in frequency domain
    • Technical Report TR 2005-11, USC Internet and Grid Computing Lab, 2005
    • Y. Chen and K. Hwang and Y. Kwok. Collaborative defense against periodic Shrew DDoS attacks in frequency domain. Technical Report TR 2005-11, USC Internet and Grid Computing Lab, 2005.
    • Chen, Y.1    Hwang, K.2    Kwok, Y.3
  • 28
    • 0031175629 scopus 로고    scopus 로고
    • The macroscopic behavior of the TCP congestion avoidance algorithm
    • Jul
    • M. Mathis, J. Semke, J. Mahdavi, and T. Ott. The macroscopic behavior of the TCP congestion avoidance algorithm. Computer Communication Review, 27(3), Jul. 1997.
    • (1997) Computer Communication Review , vol.27 , Issue.3
    • Mathis, M.1    Semke, J.2    Mahdavi, J.3    Ott, T.4
  • 30
    • 0034513474 scopus 로고    scopus 로고
    • General AIMD congestion control
    • Y. Yang and S. Lam. General AIMD congestion control. In Proc. IEEE ICNP, 2000.
    • (2000) Proc. IEEE ICNP
    • Yang, Y.1    Lam, S.2
  • 41
    • 0038514762 scopus 로고    scopus 로고
    • Discrete wavelet transform: Architectures, design and performance issues
    • M. Weeks and M. Bayoumi. Discrete wavelet transform: Architectures, design and performance issues. Journal of VLSI Signal Processing, 35, 2003.
    • (2003) Journal of VLSI Signal Processing , vol.35
    • Weeks, M.1    Bayoumi, M.2
  • 44
    • 0003833285 scopus 로고
    • Society for Industrial and Applied Mathematics, Philadelphia, PA, USA
    • I. Daubechies. Ten lectures on wavelets. Society for Industrial and Applied Mathematics, Philadelphia, PA, USA, 1992.
    • (1992) Ten lectures on wavelets
    • Daubechies, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.