메뉴 건너뛰기




Volumn 4430 LNCS, Issue , 2007, Pages 196-207

Defending DDoS attacks using hidden Markov models and cooperative reinforcement learning

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; HIDDEN MARKOV MODELS; INTERNET; LEARNING ALGORITHMS; TELECOMMUNICATION SERVICES;

EID: 38049169479     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71549-8_17     Document Type: Conference Paper
Times cited : (46)

References (18)
  • 2
    • 0032676506 scopus 로고    scopus 로고
    • A Data Mining Framework for Building Intrusion Detection Model
    • Gong L, Reiter M.K, eds, Oakland, CA: IEEE Computer Society Press
    • Lee, W.K., Stolfo, S.J.: A Data Mining Framework for Building Intrusion Detection Model. In: Gong L., Reiter M.K. (eds.): Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press (1999) 120-132
    • (1999) Proceedings of the IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.K.1    Stolfo, S.J.2
  • 4
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based, distributed denial-of-service attacks: A tutorial
    • Chang, R. K. C. Defending against flooding-based, distributed denial-of-service attacks: A tutorial, IEEE Communications Magazine 40(10), (2002) 42-51.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 5
    • 84942256107 scopus 로고    scopus 로고
    • Feinstein, L., Schnackenberg, D.: Statistical Approaches to DDoS Attack Detection and Response. Proceedings of the DARPA Information Survivability Conference and Expostion(DISCEX'03), (2003) 3030314
    • Feinstein, L., Schnackenberg, D.: Statistical Approaches to DDoS Attack Detection and Response. Proceedings of the DARPA Information Survivability Conference and Expostion(DISCEX'03), (2003) 3030314
  • 6
    • 35048886560 scopus 로고    scopus 로고
    • Using Inductive Learning for the Detection of Distributed Denial of Service Attacks
    • Noh S., Lee C., Jung, G., Choi, K.: Using Inductive Learning for the Detection of Distributed Denial of Service Attacks, Lecture Notes in Computer Science, LNCS 2690, (2003) 286-295
    • (2003) Lecture Notes in Computer Science, LNCS , vol.2690 , pp. 286-295
    • Noh, S.1    Lee, C.2    Jung, G.3    Choi, K.4
  • 7
    • 4143081502 scopus 로고    scopus 로고
    • A Covariance Analysis Model for DDoS Attack Detection
    • IEEE
    • Jin, S., Yeung, D. S.: A Covariance Analysis Model for DDoS Attack Detection. In: Proc. of the Int'l Conf. on Communications. IEEE, (2004) 1882-1886.
    • (2004) Proc. of the Int'l Conf. on Communications , pp. 1882-1886
    • Jin, S.1    Yeung, D.S.2
  • 8
    • 8344244591 scopus 로고    scopus 로고
    • An Approach to Reliably Identifying Signs of DDoS Flood Attacks Based on LRD Traffic Pattern Recognition
    • Li, M.: An Approach to Reliably Identifying Signs of DDoS Flood Attacks Based on LRD Traffic Pattern Recognition. Computer and Security, 23(7), (2004) 549-558.
    • (2004) Computer and Security , vol.23 , Issue.7 , pp. 549-558
    • Li, M.1
  • 9
    • 33646829582 scopus 로고    scopus 로고
    • Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop
    • Proc. of GCC Workshops
    • Seo, J., Lee, C., Moon J.: Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. In Proc. of GCC 2004 Workshops, LNCS, Volume 3252, (2004) 390-397
    • (2004) LNCS , vol.3252 , pp. 390-397
    • Seo, J.1    Lee, C.2    Moon, J.3
  • 11
    • 24644432749 scopus 로고    scopus 로고
    • Christopher, Kotagiri L, R.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Ad-dress Monitoring
    • Berlin Heidelberg, Springer
    • Peng, T., Christopher, Kotagiri L, R.: Proactively Detecting Distributed Denial of Service Attacks Using Source IP Ad-dress Monitoring, in Proceedings of the Third International IFIP-TC6 Networking Conference, Berlin Heidelberg, Springer, (2004) 771-782
    • (2004) Proceedings of the Third International IFIP-TC6 Networking Conference , pp. 771-782
    • Peng, T.1
  • 12
    • 0024610919 scopus 로고
    • A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
    • Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE, 77(2), (1986) 257-286
    • (1986) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 13
    • 0003375670 scopus 로고    scopus 로고
    • An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
    • Paxson, V,: An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. Computer Communication Review 31(3), (2001) 76-89
    • (2001) Computer Communication Review , vol.31 , Issue.3 , pp. 76-89
    • Paxson, V.1
  • 14
    • 38049152816 scopus 로고    scopus 로고
    • Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs
    • Proc. of 8th Australasian Conference on Information Security and Privacy, Wollongong, Australia
    • Peng, T., Leckie, C., and Kotagiri, R.: Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs, in Proc. of 8th Australasian Conference on Information Security and Privacy, Wollongong, Australia, Lecture Notes in Computer Science, LNCS 2727, (2003) 214-225
    • (2003) Lecture Notes in Computer Science, LNCS , vol.2727 , pp. 214-225
    • Peng, T.1    Leckie, C.2    Kotagiri, R.3
  • 15
    • 77953077374 scopus 로고    scopus 로고
    • Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites
    • Honolulu, Hawaii, USA
    • Jung, J., Krishnamurthy, B. and Rabinovich, M..: Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In Proceeding of 11th Word Wide Web conference. Honolulu, Hawaii, USA. (2002)
    • (2002) Proceeding of 11th Word Wide Web conference
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 17
    • 0000929496 scopus 로고    scopus 로고
    • Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm
    • Hu, J., Wellman, M. P.: Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm. In 15th Intl Conference on Machine Learning, (1998) 242-250.
    • (1998) 15th Intl Conference on Machine Learning , pp. 242-250
    • Hu, J.1    Wellman, M.P.2
  • 18
    • 27144512114 scopus 로고    scopus 로고
    • A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls
    • Xu, X.: A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls. Lecture Notes in Computer Science, LNCS 3644, (2005) 995-1003
    • (2005) Lecture Notes in Computer Science, LNCS , vol.3644 , pp. 995-1003
    • Xu, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.