메뉴 건너뛰기




Volumn , Issue , 2007, Pages

A biologically inspired denial of service detector using the random neural network

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; BAYESIAN NETWORKS; DECISION MAKING; INFORMATION SCIENCE; INTERNET; PROBLEM SOLVING; RANDOM PROCESSES; SECURITY OF DATA; SENSORS; TRANSMISSION CONTROL PROTOCOL; VEGETATION;

EID: 50249130274     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MOBHOC.2007.4428683     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 2
    • 1642617444 scopus 로고    scopus 로고
    • The Hurst Exponent over Time:Testing the Assertion That Emerging Markets Are Becoming More Efficient
    • D.O. Cajueiro and B.M. Tabak (2004) The Hurst Exponent over Time:Testing the Assertion That Emerging Markets Are Becoming More Efficient. Physica A, 336, pp. 521-537.
    • (2004) Physica A , vol.336 , pp. 521-537
    • Cajueiro, D.O.1    Tabak, B.M.2
  • 3
    • 33746985496 scopus 로고    scopus 로고
    • Y. Chen and K. Hwang (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Parallel Distrib. Comput., 66, pp. 1137-1151.
    • Y. Chen and K. Hwang (2006) Collaborative detection and filtering of shrew DDoS attacks using spectral analysis. Parallel Distrib. Comput., 66, pp. 1137-1151.
  • 4
    • 0030270532 scopus 로고    scopus 로고
    • Low bit-rate video compression with neurol networks and temporal subsampling
    • C. Cramer, E. Gelenbe, and H. Bakircioglu (1996) Low bit-rate video compression with neurol networks and temporal subsampling. Proc. IEEE, 84(6), pp. 1529-1543.
    • (1996) Proc. IEEE , vol.84 , Issue.6 , pp. 1529-1543
    • Cramer, C.1    Gelenbe, E.2    Bakircioglu, H.3
  • 7
    • 16644393989 scopus 로고    scopus 로고
    • Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
    • D. Gavrilis and F. Dermatas (2005) Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features. Computer Networks, 48, pp. 235-245.
    • (2005) Computer Networks , vol.48 , pp. 235-245
    • Gavrilis, D.1    Dermatas, F.2
  • 8
    • 0000428263 scopus 로고
    • Learning in the Recurrent Random Neural Network
    • F. Gelenbe (1993) Learning in the Recurrent Random Neural Network. Neural Computation, 5, pp. 154-164.
    • (1993) Neural Computation , vol.5 , pp. 154-164
    • Gelenbe, F.1
  • 9
    • 0027871998 scopus 로고    scopus 로고
    • E. Gelenbe, V Koubi, and F. Pekergin (1993) Dvnamical random neural network approach to the traveling salesman problem. in: Systems, Man and Cybernetics, 1993. 'Systems Engineering in the Service of Humans', IEEE Conference Proceedings, 2, pp. 630-635.
    • E. Gelenbe, V Koubi, and F. Pekergin (1993) Dvnamical random neural network approach to the traveling salesman problem. in: Systems, Man and Cybernetics, 1993. 'Systems Engineering in the Service of Humans', IEEE Conference Proceedings, 2, pp. 630-635.
  • 10
    • 21244434788 scopus 로고    scopus 로고
    • Self-aware networks and QoS
    • F. Gelenbe, R. Lent and A. Nunez (2004) Self-aware networks and QoS. Proceedings IEEE, 92(9), pp. 14781489.
    • (2004) Proceedings IEEE , vol.92 , Issue.9 , pp. 14781489
    • Gelenbe, F.1    Lent, R.2    Nunez, A.3
  • 12
    • 24644453625 scopus 로고    scopus 로고
    • Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks
    • R. Jahihi, F. Imani-Mehr, M. Amini and H.R. Shahrian (2005) Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. LNCS, 3439, pp. 192-203,
    • (2005) LNCS , vol.3439 , pp. 192-203
    • Jahihi, R.1    Imani-Mehr, F.2    Amini, M.3    Shahrian, H.R.4
  • 13
    • 33745922681 scopus 로고    scopus 로고
    • A Combined Data Mining Approach for DDoS Attack Detection
    • M. Kim, H. Na, K. Chae, H. Bang and J. Na (2004) A Combined Data Mining Approach for DDoS Attack Detection. LNCS, 3090, pp. 943-950.
    • (2004) LNCS , vol.3090 , pp. 943-950
    • Kim, M.1    Na, H.2    Chae, K.3    Bang, H.4    Na, J.5
  • 14
    • 8344244591 scopus 로고    scopus 로고
    • An Approach to Reliably Identifying Signs of DDOS Flood Attacks Based on LRD Traffic Pattem Recognition
    • M. Li (2004) An Approach to Reliably Identifying Signs of DDOS Flood Attacks Based on LRD Traffic Pattem Recognition. Computers and Security, 23, pp. 549-558.
    • (2004) Computers and Security , vol.23 , pp. 549-558
    • Li, M.1
  • 15
    • 17444397467 scopus 로고    scopus 로고
    • L, Li and C. Lee (2005) DDoS Attack Detection and Wavelets. Telecommunication Systems, 28:3(4), pp. 435-451.
    • L, Li and C. Lee (2005) DDoS Attack Detection and Wavelets. Telecommunication Systems, 28:3(4), pp. 435-451.
  • 16
    • 35048886560 scopus 로고    scopus 로고
    • Detecting Distributed Denial of Sen ice (DDoS) Attacks through Inductive Learning
    • S. Noh, C. Lee, K. Choi and G. Jung (2003) Detecting Distributed Denial of Sen ice (DDoS) Attacks through Inductive Learning. LNCS, 2690 pp. 286-295.
    • (2003) LNCS , vol.2690 , pp. 286-295
    • Noh, S.1    Lee, C.2    Choi, K.3    Jung, G.4
  • 18
    • 84871013073 scopus 로고    scopus 로고
    • UCLA CSD packet traces: http://www.lasr.cs.ucla.edu/ddos/traces/public/ usc/.
    • UCLA CSD packet traces


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.