메뉴 건너뛰기




Volumn 18, Issue 12, 2007, Pages 1649-1662

Collaborative detection of DDoS attacks over multiple network domains

Author keywords

Cyber defense; DDoS attacks; Internet technology; Network security

Indexed keywords

COMPUTER SYSTEM FIREWALLS; DISTRIBUTED COMPUTER SYSTEMS; GATEWAYS (COMPUTER NETWORKS); INTERNET PROTOCOLS; INTERNET SERVICE PROVIDERS; ROUTERS;

EID: 36348929372     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2007.1111     Document Type: Article
Times cited : (212)

References (43)
  • 1
    • 3042825073 scopus 로고    scopus 로고
    • IP Traceback: A New Denial-of-Service Deterrent
    • May/June
    • H. Aljifri, "IP Traceback: A New Denial-of-Service Deterrent," IEEE Security and Privacy, pp. 24-31, May/June 2003.
    • (2003) IEEE Security and Privacy , pp. 24-31
    • Aljifri, H.1
  • 5
    • 1642535783 scopus 로고    scopus 로고
    • A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
    • June
    • R. Blazek et al., "A Novel Approach to Detection of DoS Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," Proc. IEEE Workshop Information Assurance and Security, June 2001.
    • (2001) Proc. IEEE Workshop Information Assurance and Security
    • Blazek, R.1
  • 6
    • 33847742744 scopus 로고    scopus 로고
    • WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation
    • Apr./June
    • M. Cai, K. Hwang, J. Pan, and C. Papadupolous, "WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, Apr./June 2007.
    • (2007) IEEE Trans. Dependable and Secure Computing , vol.4 , Issue.2
    • Cai, M.1    Hwang, K.2    Pan, J.3    Papadupolous, C.4
  • 8
    • 0036871268 scopus 로고    scopus 로고
    • Internet Infrastructure Security: A Taxonomy
    • Nov
    • A. Chakrabarti and G. Manimaran, "Internet Infrastructure Security: A Taxonomy," IEEE Network, Nov. 2002.
    • (2002) IEEE Network
    • Chakrabarti, A.1    Manimaran, G.2
  • 9
    • 21244446746 scopus 로고    scopus 로고
    • Perimeter-Based Defense against High Bandwidth DDoS Attacks
    • June
    • S. Chen and Q. Song, "Perimeter-Based Defense against High Bandwidth DDoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 16, no. 6, June 2005.
    • (2005) IEEE Trans. Parallel and Distributed Systems , vol.16 , Issue.6
    • Chen, S.1    Song, Q.2
  • 10
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative Detection and Filtering of Shrew DDoS Attacks Using Spectral Analysis
    • Sept
    • Y. Chen and K. Hwang, "Collaborative Detection and Filtering of Shrew DDoS Attacks Using Spectral Analysis," J. Parallel and Distributed Computing, special issue on security in grids and distributed systems, pp. 1137-1151, Sept. 2006.
    • (2006) J. Parallel and Distributed Computing , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 13
    • 36349029422 scopus 로고    scopus 로고
    • D. Dittrich, "The "Stacheldraft" Distributed Denial of Service Attack Tool," http://staff.washington.edu/dittrich/, 2000.
    • (2000) The Stacheldraft
    • Dittrich, D.1
  • 16
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A Data-Structure for Bandwidth Attack Detection
    • Aug
    • T. Gil and M. Poletto, "MULTOPS: A Data-Structure for Bandwidth Attack Detection," Proc. 10th Usenix Security Symp., Aug. 2001.
    • (2001) Proc. 10th Usenix Security Symp
    • Gil, T.1    Poletto, M.2
  • 19
    • 33847743856 scopus 로고    scopus 로고
    • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
    • Jan.-Mar
    • K. Hwang, M. Cai, Y. Chen, and M. Qin, "Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 1, pp. 41-55, Jan.-Mar. 2007.
    • (2007) IEEE Trans. Dependable and Secure Computing , vol.4 , Issue.1 , pp. 41-55
    • Hwang, K.1    Cai, M.2    Chen, Y.3    Qin, M.4
  • 21
    • 36349024975 scopus 로고    scopus 로고
    • Report, "AS Resource Allocations," http://bgp.potaroo.net/iso3166/ascc.html,
    • ISO 3166
    • ISO 3166 Report, "AS Resource Allocations," http://bgp.potaroo.net/iso3166/ascc.html, 2006.
    • (2006)
  • 22
    • 33646418320 scopus 로고    scopus 로고
    • Why Is the Internet Traffic Bursty in Short Time Scales
    • June
    • H. Jiang and C. Dovrolis, "Why Is the Internet Traffic Bursty in Short Time Scales," Proc. ACM SIGMETRICS '05, June 2005.
    • (2005) Proc. ACM SIGMETRICS '05
    • Jiang, H.1    Dovrolis, C.2
  • 26
    • 8344261545 scopus 로고    scopus 로고
    • PacketScore: Statistics-Based Overload Control against Distributed Denial of Service Attacks
    • Y. Kim, W.C. Lau, M.C. Chuah, and H.J. Chao, "PacketScore: Statistics-Based Overload Control against Distributed Denial of Service Attacks," Proc. INFOCOM '04, 2004.
    • (2004) Proc. INFOCOM '04
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 27
    • 25844469597 scopus 로고    scopus 로고
    • You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers
    • Sept
    • T. Law, J. Lui, and D. Yau, "You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers," IEEE Trans. Parallel and Distributed Systems, Sept. 2005.
    • (2005) IEEE Trans. Parallel and Distributed Systems
    • Law, T.1    Lui, J.2    Yau, D.3
  • 36
    • 33845591142 scopus 로고    scopus 로고
    • DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection
    • Apr
    • S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection," Proc. INFOCOM '06, Apr. 2006.
    • (2006) Proc. INFOCOM '06
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 43
    • 33745686749 scopus 로고    scopus 로고
    • On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks
    • July
    • X. Wang, S. Chellappan, P. Boyer, and D. Xuan, "On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks," IEEE Trans. Parallel and Distributed Systems, vol. 17, no. 7, July 2006.
    • (2006) IEEE Trans. Parallel and Distributed Systems , vol.17 , Issue.7
    • Wang, X.1    Chellappan, S.2    Boyer, P.3    Xuan, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.