메뉴 건너뛰기




Volumn , Issue , 2007, Pages 331-337

A distributed approach using entropy to detect DDoS attacks in ISP domain

Author keywords

And false negatives; Anomaly detection; Distributed Denial of Service (DDoS); Entropy; False positives

Indexed keywords

COMPUTATION THEORY; COMPUTER SIMULATION; ENTROPY; FEATURE EXTRACTION; TOPOLOGY;

EID: 34548183355     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSCN.2007.350758     Document Type: Conference Paper
Times cited : (89)

References (17)
  • 1
    • 0036804084 scopus 로고    scopus 로고
    • Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
    • R.K.C. Chang, "Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial," IEEE Communication Magazine, 2002.
    • (2002) IEEE Communication Magazine
    • Chang, R.K.C.1
  • 2
    • 11144272176 scopus 로고    scopus 로고
    • A Taxonomy of DDoS Attack and DDoS defense Mechanisms
    • April
    • J. Mirkovic, and P. Reiher, "A Taxonomy of DDoS Attack and DDoS defense Mechanisms," ACM SIGCOMM Computer Communications Review, Volume 34, Number 2, April 2004.
    • (2004) ACM SIGCOMM Computer Communications Review , vol.34 , Issue.2
    • Mirkovic, J.1    Reiher, P.2
  • 3
    • 3242808612 scopus 로고    scopus 로고
    • Computer Crime Research Center, Available at
    • Computer Crime Research Center. "2004 CSI/FBI Computer Crime and Security Survey," Available at: http://www.crime-research.org/news/11.06. 2004/423/
    • (2004) CSI/FBI Computer Crime and Security Survey
  • 11
    • 34548152095 scopus 로고    scopus 로고
    • GT-ITM Traffic Generator Documentation and tool http://www.cc.gatech.edu/ fac/EllenLegura/graphs.html
    • GT-ITM Traffic Generator Documentation and tool http://www.cc.gatech.edu/ fac/EllenLegura/graphs.html
  • 12
    • 84874690676 scopus 로고    scopus 로고
    • Available
    • NS Documentation Available: http://www.isi.edu/ nsnam/ns
    • NS Documentation
  • 13
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, nos. 23-24, 1999.
    • (1999) Computer Networks , vol.31 , pp. 23-24
    • Paxson, V.1
  • 15
    • 34548148265 scopus 로고    scopus 로고
    • On the Robustness of Router-based Denial-of-Service Defense Systems
    • Y. Xu, and R. Guerin, "On the Robustness of Router-based Denial-of-Service Defense Systems," ACM SIGCOMM, 2005.
    • (2005) ACM SIGCOMM
    • Xu, Y.1    Guerin, R.2
  • 16
    • 34548180399 scopus 로고    scopus 로고
    • Implementing Pushback: Router-Based Defense Against DDoS Attacks
    • J. Ioannidis, and S. M. Bellovin, "Implementing Pushback: Router-Based Defense Against DDoS Attacks," IEEE INFOCOMM, 2003.
    • (2003) IEEE INFOCOMM
    • Ioannidis, J.1    Bellovin, S.M.2
  • 17
    • 34548190593 scopus 로고    scopus 로고
    • A Distributed Approach using Entropy to Detect DDoS Attack
    • Technical Report E & CE, TR, 2006, 002, Indian Institute of Technology Roorkee
    • Krishan Kumar, R.C. Joshi, and Kuldip Singh, "A Distributed Approach using Entropy to Detect DDoS Attack", Technical Report E & CE - TR - 2006 - 002, Indian Institute of Technology Roorkee, 2006.
    • (2006)
    • Krishan Kumar, R.C.J.1    Singh, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.