-
1
-
-
1242321281
-
-
C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms: Classification and state-of-the-art, Computer Networks: The Int. J. Computer and Telecommunications Networking, 44, no. 5, pp. 643-666, Apr. 2004.
-
C. Douligeris and A. Mitrokotsa, "DDoS attacks and defense mechanisms: Classification and state-of-the-art," Computer Networks: The Int. J. Computer and Telecommunications Networking, vol. 44, no. 5, pp. 643-666, Apr. 2004.
-
-
-
-
2
-
-
84904888755
-
Attacking DDoS at the source
-
Sep
-
J. Mirkovic, G. Prier, and P. L. Reiher, "Attacking DDoS at the source," in Proc. 10th IEEE Int. Conf. Network Protocols, Sep. 2002, pp. 312-321.
-
(2002)
Proc. 10th IEEE Int. Conf. Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.L.3
-
3
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed traffic
-
C. Jin, H. Wang, and K. G. Shin, "Hop-count filtering: An effective defense against spoofed traffic," in Proc. ACM Conf. Computer and Communications Security, 2003, pp. 30-41.
-
(2003)
Proc. ACM Conf. Computer and Communications Security
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
4
-
-
0038729330
-
Protection from distributed denial of service attacks using history-based IP filtering
-
May
-
T. Peng, K. R. mohanarao, and C. Leckie, "Protection from distributed denial of service attacks using history-based IP filtering," in Proc. IEEE Int. Conf. Communications, May 2003, vol. 1, pp. 482-486.
-
(2003)
Proc. IEEE Int. Conf. Communications
, vol.1
, pp. 482-486
-
-
Peng, T.1
mohanarao, K.R.2
Leckie, C.3
-
5
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables a feasibility study
-
May
-
J. B. D. Cabrera et al., "Proactive detection of distributed denial of service attacks using MIB traffic variables a feasibility study," in Proc. IEEE/IFIP Int. Symp. Integrated Network Management May 2001, pp. 609-622.
-
(2001)
Proc. IEEE/IFIP Int. Symp. Integrated Network Management
, pp. 609-622
-
-
Cabrera, J.B.D.1
-
7
-
-
35048886560
-
Detecting distributed denial of service (DDoS) attacks through inductive learning
-
S. Noh, C. Lee, K. Choi, and G. Jung, "Detecting distributed denial of service (DDoS) attacks through inductive learning," Lecture Notes in Computer Science, vol. 2690, pp. 286-295, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2690
, pp. 286-295
-
-
Noh, S.1
Lee, C.2
Choi, K.3
Jung, G.4
-
8
-
-
4544373082
-
Detecting low-profile probes and novel denial of service attacks
-
Jun
-
R. Basu, K. R. Cunningham, S. E. webster, and P. R. Lippmann, "Detecting low-profile probes and novel denial of service attacks," in Proc. 2001 IEEE Workshop on Information Assurance and Security, Jun. 2001, pp. 5-10.
-
(2001)
Proc. 2001 IEEE Workshop on Information Assurance and Security
, pp. 5-10
-
-
Basu, R.1
Cunningham, K.R.2
webster, S.E.3
Lippmann, P.R.4
-
9
-
-
33845591142
-
DDoS-resilient scheduling to counter application layer attacks under imperfect detection
-
Apr. 2006 [Online, Available
-
S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoS-resilient scheduling to counter application layer attacks under imperfect detection," in Proc. IEEE INFOCOM, Apr. 2006 [Online]. Available: http://www-ece.rice.edu/~networks/papers/dos-sched.pdf
-
Proc. IEEE INFOCOM
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
10
-
-
36048986923
-
Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds Mass. Inst. Technol
-
Tech. Report TR-969, Online. Available
-
S. Kandula, D. Katabi, M. Jacob, and A. W. Berger, Botz-4-Sale: Surviving organized DDoS attacks that mimic flash crowds Mass. Inst. Technol., Tech. Report TR-969, 2004 Online. Available: http:// www.usenix.org/events/nsdi05/tech/kandula/kandula.pdf,
-
(2004)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
11
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
Oct
-
R. K. C. Chang, "Defending against flooding-based distributed denial-of-service attacks: A tutorial," IEEE Commun. Mag., pp. 43-51, Oct. 2002.
-
(2002)
IEEE Commun. Mag
, pp. 43-51
-
-
Chang, R.K.C.1
-
12
-
-
78149402552
-
-
Online, Available
-
MyDoom virus. [Online]. Available: http://www.us-cert.gov/cas/techalerts/ TA04-028A.html
-
MyDoom virus
-
-
-
13
-
-
0037278070
-
An efficient forward-backward algorithm for an explicit duration hidden Markov model
-
Jan
-
S.-Z. Yu and H. Kobayashi, "An efficient forward-backward algorithm for an explicit duration hidden Markov model," IEEE Signal Process. Lett., vol. 10, no. 1, pp. 11-14, Jan. 2003.
-
(2003)
IEEE Signal Process. Lett
, vol.10
, Issue.1
, pp. 11-14
-
-
Yu, S.-Z.1
Kobayashi, H.2
-
14
-
-
0036082321
-
A hidden semi-Markov model for web workload self-similarity
-
Phoenix, AZ, Apr
-
S. Z. Yu, Z. Liu, M. Squillante, C. Xia, and L. Zhang, "A hidden semi-Markov model for web workload self-similarity," in Proc. 21st IEEE Int. Performance, Computing, and Communications Conf. (IPCCC 2002) Phoenix, AZ, Apr. 2002, pp. 65-72.
-
(2002)
Proc. 21st IEEE Int. Performance, Computing, and Communications Conf. (IPCCC 2002)
, pp. 65-72
-
-
Yu, S.Z.1
Liu, Z.2
Squillante, M.3
Xia, C.4
Zhang, L.5
-
15
-
-
0021372019
-
Sequential coding algorithms: A survey and cost analysis
-
Feb
-
J. B. Anderson and S. Mohan, "Sequential coding algorithms: A survey and cost analysis," IEEE Trans. Commun., vol. COM-32, pp. 169-176, Feb. 1984.
-
(1984)
IEEE Trans. Commun
, vol.COM-32
, pp. 169-176
-
-
Anderson, J.B.1
Mohan, S.2
-
17
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites
-
May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites," in Proc. 11th IEEE Int. World Wide web Conf., May 2002, pp. 252-262.
-
(2002)
Proc. 11th IEEE Int. World Wide web Conf
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
18
-
-
27544453628
-
User centric walk: An integrated approach for modeling the browsing behavior of users on the web
-
Apr
-
S. Bürklen et al., "User centric walk: An integrated approach for modeling the browsing behavior of users on the web," in Proc. 38th Annu. Simulation Symp. (ANSS'05), Apr. 2005, pp. 149-159.
-
(2005)
Proc. 38th Annu. Simulation Symp. (ANSS'05)
, pp. 149-159
-
-
Bürklen, S.1
-
19
-
-
58449093074
-
Combining the web content and usage mining to understand the visitor behavior in a web site
-
Nov
-
J. Velásquez, H. Yasuda, and T. Aoki, "Combining the web content and usage mining to understand the visitor behavior in a web site," in Proc. 3rd IEEE Int. Conf. Data Mining (ICDM'03), Nov. 2003, pp. 669-672.
-
(2003)
Proc. 3rd IEEE Int. Conf. Data Mining (ICDM'03)
, pp. 669-672
-
-
Velásquez, J.1
Yasuda, H.2
Aoki, T.3
-
20
-
-
33845596792
-
Modelling and predicting web page accesses using Markov processes
-
D. Dhyani, S. S. Bhowmick, and W.-K. Ng, "Modelling and predicting web page accesses using Markov processes," in Proc. 14th Int. Workshop on the Database and Expert Systems Applications (DEXA'03), 2003, pp. 332-336.
-
(2003)
Proc. 14th Int. Workshop on the Database and Expert Systems Applications (DEXA'03)
, pp. 332-336
-
-
Dhyani, D.1
Bhowmick, S.S.2
Ng, W.-K.3
-
21
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
Oct
-
X. D. Hoang, J. Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection using program sequences of system calls," in Proc. 11th IEEE Int. Conf. Networks, Oct. 2003, pp. 531-536.
-
(2003)
Proc. 11th IEEE Int. Conf. Networks
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
23
-
-
8344272005
-
Stochastic models for generating synthetic http source traffic
-
J. Cao, W. S. Cleveland, Y. Gao, K. Jeffay, F. D. Smith, and M. Weigle, "Stochastic models for generating synthetic http source traffic," in Proc. IEEE INFOCOM 2004, vol. 3, pp. 1546-1557.
-
Proc. IEEE INFOCOM 2004
, vol.3
, pp. 1546-1557
-
-
Cao, J.1
Cleveland, W.S.2
Gao, Y.3
Jeffay, K.4
Smith, F.D.5
Weigle, M.6
-
24
-
-
61449161644
-
-
A. Sarika, A. Saumya, and G. Bryon, DDoS attack simulation, monitoring, and analysis, CS 590D: Security Topics in Networking and Distributed Systems Final Project Report, Apr. 29, 2004, Purdue University, West Lafayette, IN. [Online]. Available: http:// www.cs.purdue.edu/homes/bgloden/DDoS_Attack_Simulation.pdf.
-
A. Sarika, A. Saumya, and G. Bryon, "DDoS attack simulation, monitoring, and analysis," CS 590D: Security Topics in Networking and Distributed Systems Final Project Report, Apr. 29, 2004, Purdue University, West Lafayette, IN. [Online]. Available: http:// www.cs.purdue.edu/homes/bgloden/DDoS_Attack_Simulation.pdf.
-
-
-
-
25
-
-
0038052872
-
Random flow network modeling and simulations for DDoS attack mitigation
-
May
-
K. Jiejun et al., "Random flow network modeling and simulations for DDoS attack mitigation," in Proc. IEEE Int. Conf. Communications (ICC '03), May 2003, vol. 1, pp. 487-491.
-
(2003)
Proc. IEEE Int. Conf. Communications (ICC '03)
, vol.1
, pp. 487-491
-
-
Jiejun, K.1
-
26
-
-
34547676515
-
A dynamic anomaly detection model for web user behavior based on HsMM
-
Nanjing, China, May
-
X. Yi and Y. Shunzheng, "A dynamic anomaly detection model for web user behavior based on HsMM," in Proc. 10th Int. Conf. Computer Supported Cooperative Work in Design (CSCWD 2006), Nanjing, China, May 2006, vol. 2, pp. 811-816.
-
(2006)
Proc. 10th Int. Conf. Computer Supported Cooperative Work in Design (CSCWD 2006)
, vol.2
, pp. 811-816
-
-
Yi, X.1
Shunzheng, Y.2
|