메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Wavelet-based detection of DoS attacks

Author keywords

[No Author keywords available]

Indexed keywords

ALARM SYSTEMS; COMPUTER ARCHITECTURE; TELECOMMUNICATION TRAFFIC; WAVELET TRANSFORMS;

EID: 50949130514     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2006.279     Document Type: Conference Paper
Times cited : (79)

References (21)
  • 2
    • 18144385431 scopus 로고    scopus 로고
    • Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks
    • Nov
    • V. A. Siris, F. Papagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks", IEEE GLOBECOM 2004, Nov. 2004, pp. 2050-2054.
    • (2004) IEEE GLOBECOM 2004 , pp. 2050-2054
    • Siris, V.A.1    Papagalou, F.2
  • 3
    • 1642535783 scopus 로고    scopus 로고
    • A Novel Approach to Detection of Denial-of-Service Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
    • R. B. Blazek, H. Kim, B. Rozovskii, A. Tartakovsky, "A Novel Approach to Detection of Denial-of-Service Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods", IEEE Workshop Information Assurance and Security, 2001, pp. 220-226.
    • (2001) IEEE Workshop Information Assurance and Security , pp. 220-226
    • Blazek, R.B.1    Kim, H.2    Rozovskii, B.3    Tartakovsky, A.4
  • 6
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • C.-M. Cheng, H.T.Kung, K.-S. Tan, "Use of spectral analysis in defense against DoS attacks", IEEE GLOBECOM 2002, pp. 2143-2148
    • (2002) IEEE GLOBECOM , pp. 2143-2148
    • Cheng, C.-M.1    Kung, H.T.2    Tan, K.-S.3
  • 9
    • 84952326439 scopus 로고    scopus 로고
    • DDos attack detection and wavelets
    • Oct
    • L. Li, G. Lee, "DDos attack detection and wavelets", IEEE ICCCN'03, Oct. 2003, pp. 421-427.
    • (2003) IEEE ICCCN'03 , pp. 421-427
    • Li, L.1    Lee, G.2
  • 10
    • 11244259034 scopus 로고    scopus 로고
    • A Wavelet-Based Framework for Proactive Detection of Network Misconfigurations
    • Workshops
    • A. Magnaghi, T. Hamada, T. Katsuyama, "A Wavelet-Based Framework for Proactive Detection of Network Misconfigurations", ACM SIGCOMM'04 Workshops, 2004.
    • (2004) ACM SIGCOMM'04
    • Magnaghi, A.1    Hamada, T.2    Katsuyama, T.3
  • 11
    • 0026686049 scopus 로고
    • Singularity Detection and Processing with Wavelets
    • Mar
    • S. Mallat, W. L. Hwang, "Singularity Detection and Processing with Wavelets", IEEE Trans. on information theory, vol. 38, No.2, Mar. 1992.
    • (1992) IEEE Trans. on information theory , vol.38 , Issue.2
    • Mallat, S.1    Hwang, W.L.2
  • 12
    • 34547292636 scopus 로고    scopus 로고
    • http://www-stat.stanford.edu/wavelab/.
  • 13
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA Off-Line Intrusion Detection Evaluation
    • Data is available at
    • R. Lippmann, et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4) 579-595, 2000. Data is available at http://www.ll.mit.edu/IST/ideval/
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1
  • 14
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A Network-based Intrusion Detection System
    • IOS Press
    • G. Vigna, R. Kemmerer, "NetSTAT: A Network-based Intrusion Detection System", Journal of Computer Security, 7(1), IOS Press, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Vigna, G.1    Kemmerer, R.2
  • 15
    • 0038011179 scopus 로고    scopus 로고
    • Specification Based Anomaly Detection: A New Approach for Detecting Network Intrusions
    • R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, S. Zhou, A. Tiwari and H. Yang, "Specification Based Anomaly Detection: A New Approach for Detecting Network Intrusions", ACM CCS, 2002.
    • (2002) ACM CCS
    • Sekar, R.1    Gupta, A.2    Frullo, J.3    Shanbhag, T.4    Zhou, S.5    Tiwari, A.6    Yang, H.7
  • 16
    • 34547344450 scopus 로고    scopus 로고
    • http://lever.cs.ucla.edu/ddos/traces
  • 17
    • 84904888755 scopus 로고    scopus 로고
    • Attacking DDoS at the Source
    • Nov
    • J. Mirkovic, G. Prier, P. Reiher, "Attacking DDoS at the Source", ICNP 2002, pp. 312-321, Nov. 2002.
    • (2002) ICNP 2002 , pp. 312-321
    • Mirkovic, J.1    Prier, G.2    Reiher, P.3
  • 18
    • 34547350790 scopus 로고    scopus 로고
    • http://www.grid.unina.it/Traffic
  • 19
    • 34547317271 scopus 로고
    • CERT Coordination Center, CA, Dec, 1999
    • CERT Coordination Center. Denial-of-service tools - Advisory CA-1999-17, http://www.cert.org/advisories/CA-1999-17.html, Dec. 1999.
    • (1917) Denial-of-service tools - Advisory
  • 20
    • 34547320427 scopus 로고    scopus 로고
    • CERT Coordination Center, CA, Jan, 2000
    • CERT Coordination Center. DoS Developments - Advisory CA-2000-01, http://www.cert.org/advisories/CA-2000-01.html, Jan. 2000.
    • (2001) DoS Developments - Advisory


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.