메뉴 건너뛰기




Volumn 25, Issue 4, 2008, Pages 511-518

An intelligent method for real-time detection of DDoS attack based on fuzzy logic

Author keywords

Abnormal traffic; Distribute Denial of Service (DDoS); Fuzzy logic; Intelligent control; Real time detection

Indexed keywords


EID: 48249144409     PISSN: 02179822     EISSN: 19930615     Source Type: Journal    
DOI: 10.1007/s11767-007-0056-6     Document Type: Article
Times cited : (13)

References (17)
  • 1
    • 0028377540 scopus 로고
    • On the self-similar nature of ethernet traffic (Extended version)
    • 1
    • W. E. Leland, M. S. Taqqu, W. Willinger, et al. On the self-similar nature of ethernet traffic (Extended version). IEEE/ACM Trans. on Networking, 2(1994)1, 1-15.
    • (1994) IEEE/ACM Trans. on Networking , vol.2 , pp. 1-15
    • Leland, W.E.1    Taqqu, M.S.2    Willinger, W.3
  • 2
    • 0029323403 scopus 로고
    • Wide area traffic: The failure of Poisson modeling
    • 3
    • V. Paxson and S. Floyd. Wide area traffic: The failure of Poisson modeling. IEEE/ACM Trans. on Networking, 3(1995)3, 226-244.
    • (1995) IEEE/ACM Trans. on Networking , vol.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 4
    • 42749105299 scopus 로고    scopus 로고
    • Congestion prediction of self-similar network through parameter estimation
    • Vancouver, Canada, April 5
    • Y. G. Kim, A. Shiravi, and P. S. Min. Congestion prediction of self-similar network through parameter estimation. Network Operations and Management Symposium, Vancouver, Canada, April 5, 2006, 1-4.
    • (2006) Network Operations and Management Symposium , pp. 1-4
    • Kim, Y.G.1    Shiravi, A.2    Min, P.S.3
  • 5
    • 27944511551 scopus 로고    scopus 로고
    • An in-depth, analytical study of sampling techniques for self-similar internet traffic
    • Columbus, OH, June 6-10
    • Guanghui He and J. C. Hou. An in-depth, analytical study of sampling techniques for self-similar internet traffic. The 25th International Conference on Distributed Computing Systems, Columbus, OH, June 6-10, 2005, 404-413.
    • (2005) The 25th International Conference on Distributed Computing Systems , pp. 404-413
    • Guanghui, H.1    Hou, J.C.2
  • 6
    • 3142512777 scopus 로고    scopus 로고
    • Detecting DDoS attack based on network self-similarity
    • 3
    • Y. Xiang, Y. Lin, W. L. Lei, et al. Detecting DDoS attack based on network self-similarity. IEE Proceeding on Communications, 151(2004)3, 292-295.
    • (2004) IEE Proceeding on Communications , vol.151 , pp. 292-295
    • Xiang, Y.1    Lin, Y.2    Lei, W.L.3
  • 9
    • 3943075860 scopus 로고    scopus 로고
    • Fast real-time Hurst parameter estimation via adaptive wavelet lifting
    • 7
    • D. Guo, X. Wang, and J. Zhang. Fast real-time Hurst parameter estimation via adaptive wavelet lifting. IEEE Trans. on Vehicular Technology, 53(2004)7, 1266-1273.
    • (2004) IEEE Trans. on Vehicular Technology , vol.53 , pp. 1266-1273
    • Guo, D.1    Wang, X.2    Zhang, J.3
  • 11
    • 48249132555 scopus 로고    scopus 로고
    • Information Systems Technology Group of MIT Lincoln Laboratory June 18
    • Information Systems Technology Group of MIT Lincoln Laboratory. The 1999 DARPA intrusion detection evaluation data set. http://www.ll.mit.edu/IST/ideval, June 18, 2006.
    • (2006) The 1999 DARPA Intrusion Detection Evaluation Data Set
  • 13
  • 17
    • 0242460526 scopus 로고    scopus 로고
    • Web-log cleaning for constructing sequential classifiers
    • 5
    • Qiang Yang and Ke Wang. Web-log cleaning for constructing sequential classifiers. Applied Artificial Intelligence, 17(2003)5, 431-441.
    • (2003) Applied Artificial Intelligence , vol.17 , pp. 431-441
    • Yang, Q.1    Wang, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.