메뉴 건너뛰기




Volumn , Issue , 2007, Pages 108-114

A framework for defending application layer DDoS attacks using an AI approach

Author keywords

Application level DDoS attack; Artificial Intelligence (AI); Back propagation algorithm; Neural network; Statistical algorithm

Indexed keywords

APPLICATION-LEVEL DDOS ATTACK; ERROR RATIO; STATISTICAL ALGORITHMS;

EID: 38349150138     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (17)
  • 1
    • 79957779849 scopus 로고    scopus 로고
    • DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek, E Trade
    • CNN
    • CNN, DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek, E Trade, CNN Headline News, 2000.
    • (2000) CNN Headline News
  • 2
    • 38349151789 scopus 로고    scopus 로고
    • CERT Coordination Center
    • CERT Coordination Center, Code Red II, http://www.cert.org/ incident_notes/IN-2001-09.htm 1
    • Code Red II
  • 3
    • 38349130092 scopus 로고    scopus 로고
    • CERT Coordination Center
    • CERT Coordination Center, Nimda worm, http://www.cert.org/ advisories/CA-2001-26.html
    • Nimda worm
  • 5
    • 38349174055 scopus 로고    scopus 로고
    • The Trustees of Indiana University
    • The Trustees of Indiana University, DDoSResources, http://www.anml.iu.edu/ddos/types.html.
    • DDoSResources
  • 8
    • 38349136121 scopus 로고    scopus 로고
    • help archive
    • Internet Relay Chat IRC
    • Internet Relay Chat (IRC) help archive, Denial of Service or "Nuke" Attacks, 1996, http://www.irchelp.org/irchelp/imke/info. html.
    • (1996) Denial of Service or "Nuke" Attacks
  • 9
    • 38349176675 scopus 로고    scopus 로고
    • More Ping of Death information
    • Insecure, "More Ping of Death information, 1996, http://www.insecure.org/sploits/ping-o-death.html.
    • (1996) Insecure
  • 11
    • 0036804084 scopus 로고    scopus 로고
    • Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial
    • Rocky K. C. Chang, Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial, IEEE Communications Magazine, 2002, 42-51
    • (2002) IEEE Communications Magazine , pp. 42-51
    • Chang, R.K.C.1
  • 12
    • 0038687704 scopus 로고    scopus 로고
    • Query-Flood DoS Attacks in Gnutella
    • Washington, U.S.A
    • N. Daswani and H. Garcia-Molina, Query-Flood DoS Attacks in Gnutella, in the Proc. of CCS '02, Washington, U.S.A., 2002, 181-192.
    • (2002) Proc. of CCS '02 , pp. 181-192
    • Daswani, N.1    Garcia-Molina, H.2
  • 14
    • 0026960366 scopus 로고
    • Theory and applications of neural networks for industrial control systems
    • T. Fukuda and T. Shibata, Theory and applications of neural networks for industrial control systems, Industrial Electronics, 39(6), 1992, 472 - 489
    • (1992) Industrial Electronics , vol.39 , Issue.6 , pp. 472-489
    • Fukuda, T.1    Shibata, T.2
  • 15
    • 38349193972 scopus 로고    scopus 로고
    • W. Yen, On Application-Level DDoS Attacks and Countermeasures, 2004 Symposium on Digital Life and Internet Technologies, 2004.
    • W. Yen, On Application-Level DDoS Attacks and Countermeasures, 2004 Symposium on Digital Life and Internet Technologies, 2004.
  • 17
    • 27544465087 scopus 로고    scopus 로고
    • Christos Siaterlis and Vasilis Maglaris, Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics, Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on 27-30, 2005, 469 - 475
    • Christos Siaterlis and Vasilis Maglaris, Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics, Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on 27-30, 2005, 469 - 475


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.