메뉴 건너뛰기




Volumn , Issue , 2008, Pages

FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain

Author keywords

Distributed denial of service (DDoS); False negatives; False positives; Network security

Indexed keywords

DDOS ATTACK; DDOS DETECTION; DIFFERENT ATTACKS; DISTRIBUTED DENIAL OF SERVICE ATTACK; DISTRIBUTED DENIAL-OF-SERVICE (DDOS); FALSE ALARM RATE; FALSE NEGATIVES; FALSE POSITIVES; HIGH BANDWIDTH; HIGH DETECTION RATE; LEGITIMATE USERS; LINUX PLATFORM; LOW RATES; NETWORK SIMULATORS; SIMULATION RESULT; STATISTICAL APPROACH; STATISTICAL MEASURES;

EID: 66649133397     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICON.2008.4772654     Document Type: Conference Paper
Times cited : (14)

References (19)
  • 1
    • 3042823049 scopus 로고    scopus 로고
    • Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks
    • C. Sangpachatanaruk, S. M. Khattab, T. Znati, R Melhem, D. Mossé, "Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks," Journal of Systems and Software, Vol. 73, Issue 1, pp. 15 - 29, 2004.
    • (2004) Journal Of Systems And Software , vol.73 , Issue.1 , pp. 15-29
    • Sangpachatanaruk, C.1    Khattab, M.S.2    Znati, T.3    Melhem, R.4    Mossé, D.5
  • 3
    • 66649107367 scopus 로고    scopus 로고
    • Ddos attacks on yahoo, buy.com, ebay, amazon, datek, e*trade
    • Feb
    • "DDoS attacks on Yahoo, Buy.com, eBay, Amazon, Datek, E*Trade," CNN Headline News, Feb. 7-11, 2000.
    • (2000) Cnn Headline News , vol.7-11
  • 4
    • 84864569071 scopus 로고    scopus 로고
    • 2005 australian computer crime and security survey
    • Available: [accessed Jan. 4, 2006]
    • AusCERT, "2005 Australian computer crime and security survey," Tech. Report, Australian Computer Emergency Response Team, 2005. Available: http://www.auscert.org.au/ crimesurvey [accessed Jan. 4, 2006].
    • (2005) Tech. Report, Australian Computer Emergency Response Team
    • Auscert1
  • 7
    • 66649090780 scopus 로고    scopus 로고
    • Available
    • NS Documentation, Available: http://www.isi.edu/ nsnam/ns.
    • Documentation, N.1
  • 8
    • 29244465140 scopus 로고    scopus 로고
    • Mitigating denial of service attacks: a tutorial
    • IOS Press
    • J. Molsa, "Mitigating denial of service attacks: A tutorial," Journal of computer security, 13, pp. 807-837, IOS Press, 2005.
    • (2005) Journal Of Computer Security , vol.13 , pp. 807-837
    • Molsa, J.1
  • 9
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • Apri.
    • J. Mirkovic, P. Reiher, "A Taxonomy of DDoS Attack and DDoS defense Mechanisms," ACM SIGCOMM Computer Communications Review, vol. 34 (2), pp. 39-53, April 2004.
    • (2004) Acm Sigcomm Computer Communications Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 10
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network based defense mechanisms countering the dos and ddos problems
    • April
    • T Peng, C Leckie, K Ramamohanarao, "Survey of Network Based Defense Mechanisms Countering the DoS and DDoS Problems," ACM Computing Surveys, vol. 39 (1), Article 3, April 2007.
    • (2007) Acm Computing Surveys , vol.39 , Issue.1 , pp. 3
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 11
    • 84856757768 scopus 로고    scopus 로고
    • An integrated approach for defending against distributed denial-of-service (ddos) attacks
    • India
    • Krishan Kumar, R. C. Joshi, and Kuldip Singh, "An Integrated Approach for Defending Against Distributed Denial-of-Service (DDoS) Attacks," In proceedings of IRISS-2006, India.
    • (2006) In Proceedings Of Iriss
    • Kumar, K.1    Joshi, C.R.2    Singh, K.3
  • 18
    • 0031334402 scopus 로고    scopus 로고
    • A quantitative comparison of graph-based models for internet topology
    • PII S1063669297084860
    • Ellen W. Zegura, Kenneth L. Calvert, and Michael J. Donahoo, "A quantitative comparison of graph-based models for Internet Topology," IEEE/ACM Transactions on Networking, 5(6), pp. 770-783, 1997. (Pubitemid 127768486)
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 770-783
    • Zegura, E.W.1    Calvert, K.L.2    Donahoo, M.J.3
  • 19
    • 66649114948 scopus 로고    scopus 로고
    • Tcp limitations on file transfer performance hamper the global internet
    • Sept., Available
    • B. Gibson, "TCP Limitations on File Transfer Performance Hamper the Global Internet," White paper, Sept. 2006. Available: http://www. niwotnetworks.com/gbx/TCPLimitsFastFileTransfer.htm.
    • (2006) White Paper
    • Gibson, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.