메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 601-607

GA-based filtering algorithm to defend against DDoS attack in high speed network

Author keywords

DDoS attack; Genetic algorithm; Netflow; Worm

Indexed keywords

COMPUTER NETWORKS; DIESEL ENGINES; GENETIC ALGORITHMS; HIGH SPEED NETWORKS; INTERNET; PUBLIC WORKS; TRAFFIC SURVEYS;

EID: 57649208548     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICNC.2008.555     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 2
    • 18144385431 scopus 로고    scopus 로고
    • Siris VA, Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks In: Regency H, ed. Global Telecommunications Conf. (GLOBECOM 2004). Dallas: IEEE, 2004. 2050-2054.
    • Siris VA, Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks In: Regency H, ed. Global Telecommunications Conf. (GLOBECOM 2004). Dallas: IEEE, 2004. 2050-2054.
  • 3
    • 0036700065 scopus 로고    scopus 로고
    • Design and implementation of distributed intrusion detection system NetNumen
    • [3]Li W, Wu LF, Hu GY. Design and implementation of distributed intrusion detection system NetNumen. Journal of Software, 2002,13(8):1723-1728
    • (2002) Journal of Software , vol.13 , Issue.8 , pp. 1723-1728
    • Li, W.1    Wu, L.F.2    Hu, G.Y.3
  • 4
    • 0142039750 scopus 로고    scopus 로고
    • IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks
    • Sung M, Xu J. IP traceback-based intelligent packet filtering: A novel technique for defending against Internet DDoS attacks. IEEE Trans. on Parallel and Distributed Systems, 2003, 14(9):861-872.
    • (2003) IEEE Trans. on Parallel and Distributed Systems , vol.14 , Issue.9 , pp. 861-872
    • Sung, M.1    Xu, J.2
  • 6
    • 0036658381 scopus 로고    scopus 로고
    • Using adaptive router throttles against distributed denial-of-service attacks
    • Liang F, Yau D. Using adaptive router throttles against distributed denial-of-service attacks. Journal of Software, 2002,13(7): 1120-1127
    • (2002) Journal of Software , vol.13 , Issue.7 , pp. 1120-1127
    • Liang, F.1    Yau, D.2
  • 7
    • 0013347997 scopus 로고    scopus 로고
    • Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics,
    • Technical Report 200 ICRD176, General Electric Research and Development Center, December
    • A. B Kulkarni, S. F. Bush, and S. C. Evans, "Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics," Technical Report 200 ICRD176, General Electric Research and Development Center, December 2001.
    • (2001)
    • Kulkarni, A.B.1    Bush, S.F.2    Evans, S.C.3
  • 9
    • 0042536226 scopus 로고    scopus 로고
    • Code-Red: A case study on the spread and victims of an Internet worm
    • IMW 2002
    • D. Moore, C. Shannon, J. Brown, Code-Red: a case study on the spread and victims of an Internet worm, in Proc. ACM IMW 2002.
    • Proc. ACM
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 10
    • 33751424902 scopus 로고    scopus 로고
    • Yu Chen, Kai Hwang, Yu-Kwong Kwok, Filtering of Shrew DDoS Attacks in Frequency Domain, lcn, pp. 786-793, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)1, 2005
    • Yu Chen, Kai Hwang, Yu-Kwong Kwok, "Filtering of Shrew DDoS Attacks in Frequency Domain," lcn, pp. 786-793, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)1, 2005
  • 12
    • 0032670943 scopus 로고    scopus 로고
    • Web caching and zipf-like distributions: Evidence and implications
    • Choudhury AK, Shroff N, eds, Los Alamitos: IEEE Press
    • Breslau L, Cao P, Fan L, Phillips G, Shenker S. Web caching and zipf-like distributions: Evidence and implications. In: Choudhury AK, Shroff N, eds. Proc. of the IEEE INFOCOM'99. Los Alamitos: IEEE Press, 1999. 126-134.
    • (1999) Proc. of the IEEE INFOCOM'99 , pp. 126-134
    • Breslau, L.1    Cao, P.2    Fan, L.3    Phillips, G.4    Shenker, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.