-
1
-
-
59249085054
-
-
Denial of Service Attacks
-
Denial of Service Attacks http://www.cert.org/techp̃s/ denial_of_service.html, 2008.
-
(2008)
-
-
-
2
-
-
59249089397
-
-
Background on DDoS http://www.ddos.com/index.php?content=products/ background.html, 2008.
-
(2008)
Background on DDoS
-
-
-
3
-
-
33947658917
-
-
Editorial, Distributed denial-of-service and intrusion detection
-
Editorial, Distributed denial-of-service and intrusion detection, Journal of Network and Computer Applications, Vol. 30, 2007, pp.819-822.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 819-822
-
-
-
4
-
-
37349125374
-
-
K. Lee, K. Kim, et al., DDoS attack detection method using cluster analysis, Expert Systems with Applications, 2007, doi:10.1016/ j.eswa. 2007.01.040.
-
K. Lee, K. Kim, et al., DDoS attack detection method using cluster analysis, Expert Systems with Applications, 2007, doi:10.1016/ j.eswa. 2007.01.040.
-
-
-
-
5
-
-
0033295259
-
Bro: A system for detecting network intruders in realtime
-
V. Paxson, Bro: a system for detecting network intruders in realtime, Computer Networks Vol. 31, 1999, pp. 2435-63.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
6
-
-
11244308676
-
TCP SYN flooding defense
-
L. Ricciuli, P. Lincoln, P. Kakkar, TCP SYN flooding defense, Communication Networks and Distributed Systems Modeling and Simulation (CNDS '99), 1999, pp. 17-20.
-
(1999)
Communication Networks and Distributed Systems Modeling and Simulation (CNDS '99)
, pp. 17-20
-
-
Ricciuli, L.1
Lincoln, P.2
Kakkar, P.3
-
8
-
-
18144411533
-
Preventing internet denial-of-service with capabilities
-
T. Anderson, T. Roscoe, D.Wetherall, Preventing internet denial-of-service with capabilities, Computer Communications Review, Vol. 34, No. 1, 2004, pp. 39-41
-
(2004)
Computer Communications Review
, vol.34
, Issue.1
, pp. 39-41
-
-
Anderson, T.1
Roscoe, T.2
Wetherall, D.3
-
9
-
-
33645791274
-
Honeycomb - creating intrusion detection signatures using honeypots
-
C. Kreibich, J. Crowcroft, Honeycomb - creating intrusion detection signatures using honeypots, Computer Communication Review (ACM SIGCOMM), Vol. 34, No. 1, 2004, pp. 51-56.
-
(2004)
Computer Communication Review (ACM SIGCOMM)
, vol.34
, Issue.1
, pp. 51-56
-
-
Kreibich, C.1
Crowcroft, J.2
-
10
-
-
2442583303
-
The LoSS technique for detecting new denial of service attacks, SoutheastCon, 2004
-
W. Allen, G. Marin, The LoSS technique for detecting new denial of service attacks, SoutheastCon, 2004. Proceedings. IEEE, 2004, pp. 302-309.
-
(2004)
Proceedings. IEEE
, pp. 302-309
-
-
Allen, W.1
Marin, G.2
-
11
-
-
59249087664
-
Protocol-Based With Feature Selection in Intrusion Detection
-
K. M. Yu, M. F. Wu, Protocol-Based With Feature Selection in Intrusion Detection, WSEAS Transactions on Computer, Vol. 3, No. 3, 2008, pp. 135-146.
-
(2008)
WSEAS Transactions on Computer
, vol.3
, Issue.3
, pp. 135-146
-
-
Yu, K.M.1
Wu, M.F.2
-
12
-
-
48749093494
-
A comprehensive faxonomy of DDoS attacks and defense mechanism applying in a smart classification
-
A. Asosheh, N. Ramezania, A comprehensive faxonomy of DDoS attacks and defense mechanism applying in a smart classification, WSEAS Transactions on Communications, Vol 7, No. 4, 2008, pp. 281-290
-
(2008)
WSEAS Transactions on Communications
, vol.7
, Issue.4
, pp. 281-290
-
-
Asosheh, A.1
Ramezania, N.2
-
13
-
-
30144436292
-
A new intrusion Detection Approach based on Network Tomography
-
H. Sun, B. Fang, H. Zhang, A new intrusion Detection Approach based on Network Tomography, WSEAS Transactions on Information Science & Applications, Vol.3, No. 2, 2006, pp. 211-117.
-
(2006)
WSEAS Transactions on Information Science & Applications
, vol.3
, Issue.2
, pp. 211-117
-
-
Sun, H.1
Fang, B.2
Zhang, H.3
-
14
-
-
22944438123
-
Protocol anomaly and pattern matching based intrusion detection system
-
D. H. Kang, B. K. Kim, J. T. Oh, Protocol anomaly and pattern matching based intrusion detection system, WSEAS Transactions on Communication, Vol.4, No. 10, 2005, pp. 994-1101.
-
(2005)
WSEAS Transactions on Communication
, vol.4
, Issue.10
, pp. 994-1101
-
-
Kang, D.H.1
Kim, B.K.2
Oh, J.T.3
-
15
-
-
31544436627
-
Denial-of-Service Attack Detection Techniques
-
G. Carl, et al., Denial-of-Service Attack Detection Techniques, IEEE Internet Computing, Vol. 10, No. 1, 2006, pp. 82-89.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
-
16
-
-
8344244591
-
An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition
-
M. Li, An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition, Computers & Security, Vol. 23, 2004, pp. 549-558.
-
(2004)
Computers & Security
, vol.23
, pp. 549-558
-
-
Li, M.1
-
17
-
-
33646900187
-
Change trend of averaged Hurst parameter of traffic under DDoS flood attacks
-
M. Li, Change trend of averaged Hurst parameter of traffic under DDoS flood attacks, Computers & Security, Vol. 25, No. 3, 2006, pp. 213-220.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 213-220
-
-
Li, M.1
-
18
-
-
33751110003
-
Wavelet based denial-of-Service detection
-
G. Carl, R. R. Brook, S. Rai, Wavelet based denial-of-Service detection, Computers & Security, Vol. 25, 2006, pp. 600-615.
-
(2006)
Computers & Security
, vol.25
, pp. 600-615
-
-
Carl, G.1
Brook, R.R.2
Rai, S.3
-
19
-
-
35148840623
-
Detecting denial - of - service attacks using the wavelet transform
-
M. Hamdi, N. Boudriga, Detecting denial - of - service attacks using the wavelet transform, Computer Communications. Vol. 30, 2007, pp. 3203-3213.
-
(2007)
Computer Communications
, vol.30
, pp. 3203-3213
-
-
Hamdi, M.1
Boudriga, N.2
-
21
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
N. Ye, X. Li, et al., Probabilistic techniques for intrusion detection based on computer audit data, IEEE Transactions on Systems, Man and Cybernetics ? Part A: Systems and Humans, Vol. 31, No.4, 2001, pp. 266-274.
-
(2001)
IEEE Transactions on Systems, Man and Cybernetics ? Part A: Systems and Humans
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
-
22
-
-
34147111253
-
Network intrusion detection in covariance feature space
-
S.Y. Jina, et al., Network intrusion detection in covariance feature space, Pattern Recognition, Vol. 40, 2007, pp. 2185-2197.
-
(2007)
Pattern Recognition
, vol.40
, pp. 2185-2197
-
-
Jina, S.Y.1
-
24
-
-
0036038437
-
-
C.Krugel, T.Toth, E.Kirda, Service specific anomaly detection for network intrusion detection, ACM, 2002.
-
C.Krugel, T.Toth, E.Kirda, Service specific anomaly detection for network intrusion detection, ACM, 2002.
-
-
-
-
25
-
-
85032752116
-
Multiscale nature of network traffic
-
P. Abry, R. Baraniuk, et al., Multiscale nature of network traffic, IEEE Signal Processing, Vol. 19, No. 3, 2002, pp. 28-46.
-
(2002)
IEEE Signal Processing
, vol.19
, Issue.3
, pp. 28-46
-
-
Abry, P.1
Baraniuk, R.2
-
26
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseilles, France
-
P. Barford, J. Kline, D. Plonka, A.Ron, A signal analysis of network traffic anomalies, In: Proceedings of ACM SIGCOMM Internet measurement workshop, Marseilles, France, 2002.
-
(2002)
Proceedings of ACM SIGCOMM Internet measurement workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
29
-
-
0003663467
-
-
McGraw-Hill Inc
-
A. Papuilis, S. U. Pillai, Probability, Random Variables, stochastic Processes, McGraw-Hill Inc., 2002.
-
(2002)
Probability, Random Variables, stochastic Processes
-
-
Papuilis, A.1
Pillai, S.U.2
|