-
2
-
-
18144385431
-
Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks
-
Nov
-
V. A. Siris, F. Papagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks", IEEE GLOBECOM 2004, Nov. 2004, pp. 2050-2054.
-
(2004)
IEEE GLOBECOM 2004
, pp. 2050-2054
-
-
Siris, V.A.1
Papagalou, F.2
-
3
-
-
1642535783
-
A Novel Approach to Detection of Denial-of-Service Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
-
R. B. Blazek, H. Kim, B. Rozovskii, A. Tartakovsky, "A Novel Approach to Detection of Denial-of-Service Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods", IEEE Workshop Information Assurance and Security, 2001, pp. 220-226.
-
(2001)
IEEE Workshop Information Assurance and Security
, pp. 220-226
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
6
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
C.-M. Cheng, H.T.Kung, K.-S. Tan, "Use of spectral analysis in defense against DoS attacks", IEEE GLOBECOM 2002, pp. 2143-2148
-
(2002)
IEEE GLOBECOM
, pp. 2143-2148
-
-
Cheng, C.-M.1
Kung, H.T.2
Tan, K.-S.3
-
8
-
-
0003254064
-
A non-intrusive, wavelet-based approach to detecting network performance problems
-
Nov
-
P. Huang, A. Feldmann, W. Willinger, "A non-intrusive, wavelet-based approach to detecting network performance problems", ACM SIGCOMM Internet Measurement Workshop, Nov. 2001.
-
(2001)
ACM SIGCOMM Internet Measurement Workshop
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
9
-
-
84952326439
-
DDos attack detection and wavelets
-
Oct
-
L. Li, G. Lee, "DDos attack detection and wavelets", IEEE ICCCN'03, Oct. 2003, pp. 421-427.
-
(2003)
IEEE ICCCN'03
, pp. 421-427
-
-
Li, L.1
Lee, G.2
-
10
-
-
11244259034
-
A Wavelet-Based Framework for Proactive Detection of Network Misconfigurations
-
Workshops
-
A. Magnaghi, T. Hamada, T. Katsuyama, "A Wavelet-Based Framework for Proactive Detection of Network Misconfigurations", ACM SIGCOMM'04 Workshops, 2004.
-
(2004)
ACM SIGCOMM'04
-
-
Magnaghi, A.1
Hamada, T.2
Katsuyama, T.3
-
11
-
-
0026686049
-
Singularity Detection and Processing with Wavelets
-
Mar
-
S. Mallat, W. L. Hwang, "Singularity Detection and Processing with Wavelets", IEEE Trans. on information theory, vol. 38, No.2, Mar. 1992.
-
(1992)
IEEE Trans. on information theory
, vol.38
, Issue.2
-
-
Mallat, S.1
Hwang, W.L.2
-
12
-
-
34547292636
-
-
http://www-stat.stanford.edu/wavelab/.
-
-
-
-
13
-
-
0034301517
-
The 1999 DARPA Off-Line Intrusion Detection Evaluation
-
Data is available at
-
R. Lippmann, et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4) 579-595, 2000. Data is available at http://www.ll.mit.edu/IST/ideval/
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
-
14
-
-
0002067431
-
NetSTAT: A Network-based Intrusion Detection System
-
IOS Press
-
G. Vigna, R. Kemmerer, "NetSTAT: A Network-based Intrusion Detection System", Journal of Computer Security, 7(1), IOS Press, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Vigna, G.1
Kemmerer, R.2
-
15
-
-
0038011179
-
Specification Based Anomaly Detection: A New Approach for Detecting Network Intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, S. Zhou, A. Tiwari and H. Yang, "Specification Based Anomaly Detection: A New Approach for Detecting Network Intrusions", ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Zhou, S.5
Tiwari, A.6
Yang, H.7
-
16
-
-
34547344450
-
-
http://lever.cs.ucla.edu/ddos/traces
-
-
-
-
17
-
-
84904888755
-
Attacking DDoS at the Source
-
Nov
-
J. Mirkovic, G. Prier, P. Reiher, "Attacking DDoS at the Source", ICNP 2002, pp. 312-321, Nov. 2002.
-
(2002)
ICNP 2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
18
-
-
34547350790
-
-
http://www.grid.unina.it/Traffic
-
-
-
-
19
-
-
34547317271
-
-
CERT Coordination Center, CA, Dec, 1999
-
CERT Coordination Center. Denial-of-service tools - Advisory CA-1999-17, http://www.cert.org/advisories/CA-1999-17.html, Dec. 1999.
-
(1917)
Denial-of-service tools - Advisory
-
-
-
20
-
-
34547320427
-
-
CERT Coordination Center, CA, Jan, 2000
-
CERT Coordination Center. DoS Developments - Advisory CA-2000-01, http://www.cert.org/advisories/CA-2000-01.html, Jan. 2000.
-
(2001)
DoS Developments - Advisory
-
-
-
21
-
-
30344436961
-
Monitoring the macroscopic effect of DDos flooding attacks
-
J. Yuan, K. Mills, "Monitoring the macroscopic effect of DDos flooding attacks", IEEE Trans. on dependable and secure computing, vol.2, N.4, 2005.
-
(2005)
IEEE Trans. on dependable and secure computing
, vol.2
, Issue.4
-
-
Yuan, J.1
Mills, K.2
|