-
3
-
-
18144369239
-
DiDDeM: A system for early detection of TCP SYN flood attacks
-
Dec
-
J. Haggerty, T. Berry, Q. Shi, and M. Merabik, "DiDDeM: A system for early detection of TCP SYN flood attacks," Proc. IEEE GLOBECOM 2004, vol.4, no.4, pp.2037-2042, Dec. 2004.
-
(2004)
Proc. IEEE GLOBECOM
, vol.4
, Issue.4
, pp. 2037-2042
-
-
Haggerty, J.1
Berry, T.2
Shi, Q.3
Merabik, M.4
-
7
-
-
0036343692
-
Detecting SYN flooding attacks
-
June
-
H.Wang, D. Zhang, and K. Shin, "Detecting SYN flooding attacks," Proc. IEEE INFOCOM 2002, no.1, pp.1530-1539, June 2002.
-
(2002)
Proc. IEEE INFOCOM 2002
, Issue.1
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
8
-
-
50949130514
-
Wavelet-based detection of DoS attacks
-
Nov
-
A. Dainotti, A. Pescape, and G. Ventre, "Wavelet-based detection of DoS attacks," Proc. IEEE GLOBECOM 2006, vol.25, no.1, pp.1452-1457, Nov. 2006.
-
(2006)
Proc. IEEE GLOBECOM
, vol.25
, Issue.1
, pp. 1452-1457
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
9
-
-
84893496533
-
Aberrant behavior detection in time series for network monitoring
-
Dec
-
J. Brutlag, "Aberrant behavior detection in time series for network monitoring," USENIX Fourteenth System Administration Conference LISA XIV, pp.139-146, Dec. 2000.
-
(2000)
USENIX Fourteenth System Administration Conference LISA
, vol.14
, pp. 139-146
-
-
Brutlag, J.1
-
10
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
Dec
-
C.M. Cheng, H.T. Kung, and K.S. Tan, "Use of spectral analysis in defense against DoS attacks," Proc. IEEE GLOBECOM2002, vol.3, no.3, pp.2143-2148, Dec. 2002.
-
(2002)
Proc. IEEE GLOBECOM2002
, vol.3
, Issue.3
, pp. 2143-2148
-
-
Cheng, C.M.1
Kung, H.T.2
Tan, K.S.3
-
11
-
-
18144385431
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Nov
-
V.A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," Proc. IEEE GLOBECOM 2004, vol.4, pp.2050-2054, Nov. 2004.
-
(2004)
Proc. IEEE GLOBECOM
, vol.4
, pp. 2050-2054
-
-
Siris, V.A.1
Papagalou, F.2
-
12
-
-
0034301517
-
-
R. Lippmann, et al., The 1999 DARPA off-line intrusion detection evaluation, Comput. Netw., 34, no.4, pp.579-595, 2000. Data is available at http://www.ll.mit.edu/IST/ideval/
-
R. Lippmann, et al., "The 1999 DARPA off-line intrusion detection evaluation," Comput. Netw., vol.34, no.4, pp.579-595, 2000. Data is available at http://www.ll.mit.edu/IST/ideval/
-
-
-
-
13
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
G. Vigna and R. Kemmerer, "NetSTAT: A network-based intrusion detection system," J. Computer Security, vol.7, no.1, pp.37-71, 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.2
-
14
-
-
0038011179
-
Specification based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, S. Zhou, A. Tiwari, and H. Yang, "Specification based anomaly detection: A new approach for detecting network intrusions," Proc. ACM CCS, 2002.
-
(2002)
Proc. ACM CCS
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Zhou, S.5
Tiwari, A.6
Yang, H.7
-
15
-
-
85027176665
-
-
http://www.sinet.ad.jp
-
-
-
-
17
-
-
84952326439
-
DDos attack detection and wavelets
-
Oct
-
L. Li and G. Lee, "DDos attack detection and wavelets," Proc. IEEE ICCCN 2003, pp.421-427, Oct. 2003.
-
(2003)
Proc. IEEE ICCCN 2003
, pp. 421-427
-
-
Li, L.1
Lee, G.2
-
18
-
-
0002624024
-
Tracing anonymous packets to their approximate source
-
Dec
-
H. Burch and B. Cheswick, "Tracing anonymous packets to their approximate source," Proc. Usenix LISA, Dec. 2000.
-
(2000)
Proc. Usenix LISA
-
-
Burch, H.1
Cheswick, B.2
|