메뉴 건너뛰기




Volumn 7, Issue 8, 2008, Pages 1159-1168

DDoS attacks detection model and its application

Author keywords

Algorithm; Application; Attack; DDoS; Detection; Modal

Indexed keywords

ALGORITHMS; APPLICATIONS; DISTRIBUTED COMPUTER SYSTEMS; INTERNET;

EID: 59249106247     PISSN: 11092750     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (17)

References (29)
  • 1
    • 59249085054 scopus 로고    scopus 로고
    • Denial of Service Attacks
    • Denial of Service Attacks http://www.cert.org/techp̃s/ denial_of_service.html, 2008.
    • (2008)
  • 2
    • 59249089397 scopus 로고    scopus 로고
    • Background on DDoS http://www.ddos.com/index.php?content=products/ background.html, 2008.
    • (2008) Background on DDoS
  • 3
    • 33947658917 scopus 로고    scopus 로고
    • Editorial, Distributed denial-of-service and intrusion detection
    • Editorial, Distributed denial-of-service and intrusion detection, Journal of Network and Computer Applications, Vol. 30, 2007, pp.819-822.
    • (2007) Journal of Network and Computer Applications , vol.30 , pp. 819-822
  • 4
    • 37349125374 scopus 로고    scopus 로고
    • K. Lee, K. Kim, et al., DDoS attack detection method using cluster analysis, Expert Systems with Applications, 2007, doi:10.1016/ j.eswa. 2007.01.040.
    • K. Lee, K. Kim, et al., DDoS attack detection method using cluster analysis, Expert Systems with Applications, 2007, doi:10.1016/ j.eswa. 2007.01.040.
  • 5
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in realtime
    • V. Paxson, Bro: a system for detecting network intruders in realtime, Computer Networks Vol. 31, 1999, pp. 2435-63.
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 8
    • 18144411533 scopus 로고    scopus 로고
    • Preventing internet denial-of-service with capabilities
    • T. Anderson, T. Roscoe, D.Wetherall, Preventing internet denial-of-service with capabilities, Computer Communications Review, Vol. 34, No. 1, 2004, pp. 39-41
    • (2004) Computer Communications Review , vol.34 , Issue.1 , pp. 39-41
    • Anderson, T.1    Roscoe, T.2    Wetherall, D.3
  • 9
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb - creating intrusion detection signatures using honeypots
    • C. Kreibich, J. Crowcroft, Honeycomb - creating intrusion detection signatures using honeypots, Computer Communication Review (ACM SIGCOMM), Vol. 34, No. 1, 2004, pp. 51-56.
    • (2004) Computer Communication Review (ACM SIGCOMM) , vol.34 , Issue.1 , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2
  • 10
    • 2442583303 scopus 로고    scopus 로고
    • The LoSS technique for detecting new denial of service attacks, SoutheastCon, 2004
    • W. Allen, G. Marin, The LoSS technique for detecting new denial of service attacks, SoutheastCon, 2004. Proceedings. IEEE, 2004, pp. 302-309.
    • (2004) Proceedings. IEEE , pp. 302-309
    • Allen, W.1    Marin, G.2
  • 11
    • 59249087664 scopus 로고    scopus 로고
    • Protocol-Based With Feature Selection in Intrusion Detection
    • K. M. Yu, M. F. Wu, Protocol-Based With Feature Selection in Intrusion Detection, WSEAS Transactions on Computer, Vol. 3, No. 3, 2008, pp. 135-146.
    • (2008) WSEAS Transactions on Computer , vol.3 , Issue.3 , pp. 135-146
    • Yu, K.M.1    Wu, M.F.2
  • 12
    • 48749093494 scopus 로고    scopus 로고
    • A comprehensive faxonomy of DDoS attacks and defense mechanism applying in a smart classification
    • A. Asosheh, N. Ramezania, A comprehensive faxonomy of DDoS attacks and defense mechanism applying in a smart classification, WSEAS Transactions on Communications, Vol 7, No. 4, 2008, pp. 281-290
    • (2008) WSEAS Transactions on Communications , vol.7 , Issue.4 , pp. 281-290
    • Asosheh, A.1    Ramezania, N.2
  • 14
    • 22944438123 scopus 로고    scopus 로고
    • Protocol anomaly and pattern matching based intrusion detection system
    • D. H. Kang, B. K. Kim, J. T. Oh, Protocol anomaly and pattern matching based intrusion detection system, WSEAS Transactions on Communication, Vol.4, No. 10, 2005, pp. 994-1101.
    • (2005) WSEAS Transactions on Communication , vol.4 , Issue.10 , pp. 994-1101
    • Kang, D.H.1    Kim, B.K.2    Oh, J.T.3
  • 15
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-Service Attack Detection Techniques
    • G. Carl, et al., Denial-of-Service Attack Detection Techniques, IEEE Internet Computing, Vol. 10, No. 1, 2006, pp. 82-89.
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1
  • 16
    • 8344244591 scopus 로고    scopus 로고
    • An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition
    • M. Li, An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition, Computers & Security, Vol. 23, 2004, pp. 549-558.
    • (2004) Computers & Security , vol.23 , pp. 549-558
    • Li, M.1
  • 17
    • 33646900187 scopus 로고    scopus 로고
    • Change trend of averaged Hurst parameter of traffic under DDoS flood attacks
    • M. Li, Change trend of averaged Hurst parameter of traffic under DDoS flood attacks, Computers & Security, Vol. 25, No. 3, 2006, pp. 213-220.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 213-220
    • Li, M.1
  • 18
    • 33751110003 scopus 로고    scopus 로고
    • Wavelet based denial-of-Service detection
    • G. Carl, R. R. Brook, S. Rai, Wavelet based denial-of-Service detection, Computers & Security, Vol. 25, 2006, pp. 600-615.
    • (2006) Computers & Security , vol.25 , pp. 600-615
    • Carl, G.1    Brook, R.R.2    Rai, S.3
  • 19
    • 35148840623 scopus 로고    scopus 로고
    • Detecting denial - of - service attacks using the wavelet transform
    • M. Hamdi, N. Boudriga, Detecting denial - of - service attacks using the wavelet transform, Computer Communications. Vol. 30, 2007, pp. 3203-3213.
    • (2007) Computer Communications , vol.30 , pp. 3203-3213
    • Hamdi, M.1    Boudriga, N.2
  • 22
    • 34147111253 scopus 로고    scopus 로고
    • Network intrusion detection in covariance feature space
    • S.Y. Jina, et al., Network intrusion detection in covariance feature space, Pattern Recognition, Vol. 40, 2007, pp. 2185-2197.
    • (2007) Pattern Recognition , vol.40 , pp. 2185-2197
    • Jina, S.Y.1
  • 24
    • 0036038437 scopus 로고    scopus 로고
    • C.Krugel, T.Toth, E.Kirda, Service specific anomaly detection for network intrusion detection, ACM, 2002.
    • C.Krugel, T.Toth, E.Kirda, Service specific anomaly detection for network intrusion detection, ACM, 2002.
  • 25
    • 85032752116 scopus 로고    scopus 로고
    • Multiscale nature of network traffic
    • P. Abry, R. Baraniuk, et al., Multiscale nature of network traffic, IEEE Signal Processing, Vol. 19, No. 3, 2002, pp. 28-46.
    • (2002) IEEE Signal Processing , vol.19 , Issue.3 , pp. 28-46
    • Abry, P.1    Baraniuk, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.