메뉴 건너뛰기




Volumn E91-D, Issue 5, 2008, Pages 1274-1281

IP packet size entropy-based scheme for detection of DoS/DDoS attacks

Author keywords

Attack detection; Denial of service attack; Network security

Indexed keywords

DENIAL-OF-SERVICE ATTACK; ENTROPY; INTERNET PROTOCOLS; NETWORK SECURITY;

EID: 68149178268     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1093/ietisy/e91-d.5.1274     Document Type: Article
Times cited : (25)

References (18)
  • 3
    • 18144369239 scopus 로고    scopus 로고
    • DiDDeM: A system for early detection of TCP SYN flood attacks
    • Dec
    • J. Haggerty, T. Berry, Q. Shi, and M. Merabik, "DiDDeM: A system for early detection of TCP SYN flood attacks," Proc. IEEE GLOBECOM 2004, vol.4, no.4, pp.2037-2042, Dec. 2004.
    • (2004) Proc. IEEE GLOBECOM , vol.4 , Issue.4 , pp. 2037-2042
    • Haggerty, J.1    Berry, T.2    Shi, Q.3    Merabik, M.4
  • 7
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • June
    • H.Wang, D. Zhang, and K. Shin, "Detecting SYN flooding attacks," Proc. IEEE INFOCOM 2002, no.1, pp.1530-1539, June 2002.
    • (2002) Proc. IEEE INFOCOM 2002 , Issue.1 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.3
  • 8
    • 50949130514 scopus 로고    scopus 로고
    • Wavelet-based detection of DoS attacks
    • Nov
    • A. Dainotti, A. Pescape, and G. Ventre, "Wavelet-based detection of DoS attacks," Proc. IEEE GLOBECOM 2006, vol.25, no.1, pp.1452-1457, Nov. 2006.
    • (2006) Proc. IEEE GLOBECOM , vol.25 , Issue.1 , pp. 1452-1457
    • Dainotti, A.1    Pescape, A.2    Ventre, G.3
  • 9
    • 84893496533 scopus 로고    scopus 로고
    • Aberrant behavior detection in time series for network monitoring
    • Dec
    • J. Brutlag, "Aberrant behavior detection in time series for network monitoring," USENIX Fourteenth System Administration Conference LISA XIV, pp.139-146, Dec. 2000.
    • (2000) USENIX Fourteenth System Administration Conference LISA , vol.14 , pp. 139-146
    • Brutlag, J.1
  • 10
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • Dec
    • C.M. Cheng, H.T. Kung, and K.S. Tan, "Use of spectral analysis in defense against DoS attacks," Proc. IEEE GLOBECOM2002, vol.3, no.3, pp.2143-2148, Dec. 2002.
    • (2002) Proc. IEEE GLOBECOM2002 , vol.3 , Issue.3 , pp. 2143-2148
    • Cheng, C.M.1    Kung, H.T.2    Tan, K.S.3
  • 11
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • Nov
    • V.A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," Proc. IEEE GLOBECOM 2004, vol.4, pp.2050-2054, Nov. 2004.
    • (2004) Proc. IEEE GLOBECOM , vol.4 , pp. 2050-2054
    • Siris, V.A.1    Papagalou, F.2
  • 12
    • 0034301517 scopus 로고    scopus 로고
    • R. Lippmann, et al., The 1999 DARPA off-line intrusion detection evaluation, Comput. Netw., 34, no.4, pp.579-595, 2000. Data is available at http://www.ll.mit.edu/IST/ideval/
    • R. Lippmann, et al., "The 1999 DARPA off-line intrusion detection evaluation," Comput. Netw., vol.34, no.4, pp.579-595, 2000. Data is available at http://www.ll.mit.edu/IST/ideval/
  • 13
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A network-based intrusion detection system
    • G. Vigna and R. Kemmerer, "NetSTAT: A network-based intrusion detection system," J. Computer Security, vol.7, no.1, pp.37-71, 1999.
    • (1999) J. Computer Security , vol.7 , Issue.1 , pp. 37-71
    • Vigna, G.1    Kemmerer, R.2
  • 15
    • 85027176665 scopus 로고    scopus 로고
    • http://www.sinet.ad.jp
  • 16
  • 17
    • 84952326439 scopus 로고    scopus 로고
    • DDos attack detection and wavelets
    • Oct
    • L. Li and G. Lee, "DDos attack detection and wavelets," Proc. IEEE ICCCN 2003, pp.421-427, Oct. 2003.
    • (2003) Proc. IEEE ICCCN 2003 , pp. 421-427
    • Li, L.1    Lee, G.2
  • 18
    • 0002624024 scopus 로고    scopus 로고
    • Tracing anonymous packets to their approximate source
    • Dec
    • H. Burch and B. Cheswick, "Tracing anonymous packets to their approximate source," Proc. Usenix LISA, Dec. 2000.
    • (2000) Proc. Usenix LISA
    • Burch, H.1    Cheswick, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.