메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1229-1234

Detecting flooding-based DDoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; INFORMATION SYSTEMS; INTERNET; MATHEMATICAL MODELS; TELECOMMUNICATION TRAFFIC;

EID: 38549153397     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2007.208     Document Type: Conference Paper
Times cited : (24)

References (26)
  • 6
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-service attack detection techniques
    • January
    • G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-service attack detection techniques," IEEE Internet Computing, vol. 10, no. 1, January 2006, pp. 82-89.
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.3    Rai, S.4
  • 7
    • 38549153429 scopus 로고    scopus 로고
    • VINT Project U. C. Berkeley/LBNL, NS2: network simulator, Available at http://www.isi.edu/nsnam/ns, 2006.
    • VINT Project U. C. Berkeley/LBNL, "NS2: network simulator," Available at http://www.isi.edu/nsnam/ns, 2006.
  • 12
    • 3543088029 scopus 로고    scopus 로고
    • Detecting network attacks in the internet via statistical network traffic normality prediction
    • J. Jiang and S. Papavassiliou, "Detecting network attacks in the internet via statistical network traffic normality prediction," Journal of Network and System Management, vol. 12, no. 1, 2004, pp. 51-72.
    • (2004) Journal of Network and System Management , vol.12 , Issue.1 , pp. 51-72
    • Jiang, J.1    Papavassiliou, S.2
  • 13
    • 33744996243 scopus 로고    scopus 로고
    • Abnormal traffic detection and its implementation
    • February
    • S. Lee, H. Kim, J. Na, and J. Jang, "Abnormal traffic detection and its implementation," Advanced Communication Technology, vol. 1, February 2005, pp. 246-250.
    • (2005) Advanced Communication Technology , vol.1 , pp. 246-250
    • Lee, S.1    Kim, H.2    Na, J.3    Jang, J.4
  • 16
    • 18744362271 scopus 로고    scopus 로고
    • The Swiss Education and Research Network, Available at, 2002
    • The Swiss Education and Research Network, "Default TTL values in TCP/IP," Available at http://secfr.nerim.net/docs/fingerprint/en/ ttldefault.html, 2002.
    • Default TTL values in TCP/IP
  • 19
    • 0034842243 scopus 로고    scopus 로고
    • Internet traffic modeling and predict ion using FARIMA models
    • Y. Shu, L. Wang, and L. Zhang, "Internet traffic modeling and predict ion using FARIMA models," Chinese Journal of Computers, vol. 1, no. 24, 2001, pp. 46-54.
    • (2001) Chinese Journal of Computers , vol.1 , Issue.24 , pp. 46-54
    • Shu, Y.1    Wang, L.2    Zhang, L.3
  • 21
    • 0038052872 scopus 로고    scopus 로고
    • Random flow network modeling and simulations for DDoS attack mitigation
    • May
    • J. Kong, M. Mirza, J. Shu, C. Yoedhana, M. Gerla, and S. Lu, "Random flow network modeling and simulations for DDoS attack mitigation," Communications, vol. 1, May 2003, pp. 487-491.
    • (2003) Communications , vol.1 , pp. 487-491
    • Kong, J.1    Mirza, M.2    Shu, J.3    Yoedhana, C.4    Gerla, M.5    Lu, S.6
  • 22
    • 0033204106 scopus 로고    scopus 로고
    • On power-law relationships of the internet topology
    • M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the internet topology," in SIGCOMM, 1999, pp. 251-262.
    • (1999) SIGCOMM , pp. 251-262
    • Faloutsos, M.1    Faloutsos, P.2    Faloutsos, C.3
  • 23
    • 38549173087 scopus 로고    scopus 로고
    • Topology Project University of Michigan, Inet: Internet Topology Generator, Available at topology.eecs.umich.edu/inet/, 2006.
    • Topology Project University of Michigan, "Inet: Internet Topology Generator," Available at topology.eecs.umich.edu/inet/, 2006.
  • 25
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of poisson modeling
    • June
    • V. Paxson and S. Floyd, "Wide-area traffic: the failure of poisson modeling," in IEEE/ACM Transactions on Networking, vol. 3, no. 3, June 1995, pp. 226-244.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.