메뉴 건너뛰기




Volumn 51, Issue 18, 2007, Pages 5036-5056

Robust and efficient detection of DDoS attacks for large-scale internet

Author keywords

Detection; Distributed denial of service (DDoS) attacks; Machine learning; Spatial correlation

Indexed keywords

COMPUTER SIMULATION; CORRELATION DETECTORS; INTERNET; LARGE SCALE SYSTEMS; LEARNING SYSTEMS; ROBUST CONTROL; SECURITY OF DATA;

EID: 35549011836     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2007.08.008     Document Type: Article
Times cited : (78)

References (21)
  • 2
    • 10644248262 scopus 로고    scopus 로고
    • Characterization of defense mechanisms against distributed denial of service attacks
    • Chen L.-C., Longstaffv T.A., and Carley K.M. Characterization of defense mechanisms against distributed denial of service attacks. Computers & Security 23 8 (2004) 665-678
    • (2004) Computers & Security , vol.23 , Issue.8 , pp. 665-678
    • Chen, L.-C.1    Longstaffv, T.A.2    Carley, K.M.3
  • 3
    • 35548933049 scopus 로고    scopus 로고
    • S.S. Kim, A.L.N. Reddy, M. Vannucci, Detecting traffic anomalies using discrete wavelet transform, in: Proceedings of International Conference on Information Networking (ICOIN), Busan, Korea, 2004, vol. III, pp. 1375-1384.
  • 4
    • 0036967463 scopus 로고    scopus 로고
    • C.-M. Cheng, H.T. Kung, K.-S. Tan, Use of spectral analysis in defense against dos attacks, in: Proceedings of IEEE GLOBECOM 2002, Taipei, Taiwan, 2002.
  • 5
    • 35548940909 scopus 로고    scopus 로고
    • A. Hussain, J. Heidemann, C. Papadopoulos, A framework for classifying denial of service attacks, in: Proceedings of ACM SIGCOMM, Karlsruhe, Germany, 2003.
  • 6
    • 0036343692 scopus 로고    scopus 로고
    • H. Wang, D. Zhang, K.G. Shin, Detecting SYN flooding attacks, in: Proceedings of IEEE INFOCOM'2002, New York City, NY, 2002, pp. 1530-1539.
  • 7
    • 35548966845 scopus 로고    scopus 로고
    • T. Peng, C. Leckie, K. Ramamohanarao, Detecting distributed denial of service attacks using source IP address monitoring, Tech. Rep., Department of Computer Science and Software Engineering, The University of Melbourne, 2002. URL .
  • 8
    • 35548947301 scopus 로고    scopus 로고
    • R.B. Blazek, H. Kim, B. Rozovskii, A. Tartakovsky, A novel approach to detection of "denial-of-service attacks via adaptive sequential and batch- sequential change-point detection methods, in: Proceedings of IEEE Workshop on Information Assurance and Security, West Point, NY, 2001, pp. 220-226.
  • 9
    • 0037860750 scopus 로고    scopus 로고
    • S. Mukkamala, A.H. Sung, Detecting denial of service attacks using support vector machines, in: Proceedings of IEEE International Conference on Fuzzy Systems, 2003.
  • 10
    • 35548950454 scopus 로고    scopus 로고
    • S. Savage, D. Wetherall, A. Karlin, T. Anderson, Practical network support for ip traceback, in: Proceedings of ACM SIGCOMM'2000, 2000.
  • 11
    • 35548953926 scopus 로고    scopus 로고
    • P. Ferguson, D. Senie, Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing, IETF, RFC 2267.
  • 12
    • 35548949089 scopus 로고    scopus 로고
    • K. Park, H. Lee, On the effectiveness of route-based packet filtering for distributed dos attack prevention in power-law internets, in: Proceedings of ACM SIGCOMM, 2001.
  • 13
    • 21244446746 scopus 로고    scopus 로고
    • Perimeter-based defense against high bandwidth DDoS attacks
    • Chen S., and Song Q. Perimeter-based defense against high bandwidth DDoS attacks. IEEE Trans. Parallel Distrib. Syst. 16 6 (2005) 526-537
    • (2005) IEEE Trans. Parallel Distrib. Syst. , vol.16 , Issue.6 , pp. 526-537
    • Chen, S.1    Song, Q.2
  • 15
    • 0038729330 scopus 로고    scopus 로고
    • T. Peng, C. Leckie, K. Ramamohanarao, Protection from distributed denial of service attacks using history-based IP filtering, in: Proceedings of IEEE ICC 2003, Anchorage, AK, 2003, pp. 482-486.
  • 16
    • 84942256107 scopus 로고    scopus 로고
    • L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred, Statistical approaches to DDoS attack detection and response, in: Proceedings of DARPA Information Survivability Conference and Exposition, vol. 1, 2003, pp. 303-314.
  • 17
    • 35548944630 scopus 로고    scopus 로고
    • A. Yaar, A. Perrig, D. Song, Stackpi: New packet marking and filtering mechanisms for ddos and ip spoofing defense, Tech. Rep., Carnegie Mellon University, 2003.
  • 18
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom B.H. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13 7 (1970) 422-426
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 21
    • 35548977742 scopus 로고    scopus 로고
    • Auckland-IV trace data, 2001. URL .


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.