-
2
-
-
10644248262
-
Characterization of defense mechanisms against distributed denial of service attacks
-
Chen L.-C., Longstaffv T.A., and Carley K.M. Characterization of defense mechanisms against distributed denial of service attacks. Computers & Security 23 8 (2004) 665-678
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 665-678
-
-
Chen, L.-C.1
Longstaffv, T.A.2
Carley, K.M.3
-
3
-
-
35548933049
-
-
S.S. Kim, A.L.N. Reddy, M. Vannucci, Detecting traffic anomalies using discrete wavelet transform, in: Proceedings of International Conference on Information Networking (ICOIN), Busan, Korea, 2004, vol. III, pp. 1375-1384.
-
-
-
-
4
-
-
0036967463
-
-
C.-M. Cheng, H.T. Kung, K.-S. Tan, Use of spectral analysis in defense against dos attacks, in: Proceedings of IEEE GLOBECOM 2002, Taipei, Taiwan, 2002.
-
-
-
-
5
-
-
35548940909
-
-
A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of ACM SIGCOMM, Karlsruhe, Germany, 2003.
-
-
-
-
6
-
-
0036343692
-
-
H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of IEEE INFOCOM'2002, New York City, NY, 2002, pp. 1530-1539.
-
-
-
-
7
-
-
35548966845
-
-
T. Peng, C. Leckie, K. Ramamohanarao, Detecting distributed denial of service attacks using source IP address monitoring, Tech. Rep., Department of Computer Science and Software Engineering, The University of Melbourne, 2002. URL .
-
-
-
-
8
-
-
35548947301
-
-
R.B. Blazek, H. Kim, B. Rozovskii, A. Tartakovsky, A novel approach to detection of "denial-of-service attacks via adaptive sequential and batch- sequential change-point detection methods, in: Proceedings of IEEE Workshop on Information Assurance and Security, West Point, NY, 2001, pp. 220-226.
-
-
-
-
9
-
-
0037860750
-
-
S. Mukkamala, A.H. Sung, Detecting denial of service attacks using support vector machines, in: Proceedings of IEEE International Conference on Fuzzy Systems, 2003.
-
-
-
-
10
-
-
35548950454
-
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for ip traceback, in: Proceedings of ACM SIGCOMM'2000, 2000.
-
-
-
-
11
-
-
35548953926
-
-
P. Ferguson, D. Senie, Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing, IETF, RFC 2267.
-
-
-
-
12
-
-
35548949089
-
-
K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM, 2001.
-
-
-
-
13
-
-
21244446746
-
Perimeter-based defense against high bandwidth DDoS attacks
-
Chen S., and Song Q. Perimeter-based defense against high bandwidth DDoS attacks. IEEE Trans. Parallel Distrib. Syst. 16 6 (2005) 526-537
-
(2005)
IEEE Trans. Parallel Distrib. Syst.
, vol.16
, Issue.6
, pp. 526-537
-
-
Chen, S.1
Song, Q.2
-
15
-
-
0038729330
-
-
T. Peng, C. Leckie, K. Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering, in: Proceedings of IEEE ICC 2003, Anchorage, AK, 2003, pp. 482-486.
-
-
-
-
16
-
-
84942256107
-
-
L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred, Statistical approaches to DDoS attack detection and response, in: Proceedings of DARPA Information Survivability Conference and Exposition, vol. 1, 2003, pp. 303-314.
-
-
-
-
17
-
-
35548944630
-
-
A. Yaar, A. Perrig, D. Song, Stackpi: New packet marking and filtering mechanisms for ddos and ip spoofing defense, Tech. Rep., Carnegie Mellon University, 2003.
-
-
-
-
18
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom B.H. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13 7 (1970) 422-426
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
21
-
-
35548977742
-
-
Auckland-IV trace data, 2001. URL .
-
-
-
|