-
1
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
1089-7801
-
Carl, G., Kesidis, G., Brooks, R.R., and Rai, S.: ' Denial-of-service attack-detection techniques ', IEEE Internet Comput., 2006, 10, (1), p. 82-89 1089-7801
-
(2006)
IEEE Internet Comput.
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
2
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
October
-
Gu, Y., McCallum, A., and Towsley, D.: ' Detecting anomalies in network traffic using maximum entropy estimation ', Proc. ACM/SIGCOMM Internet Measurement Conf. - IMC 2005, October, 2005
-
(2005)
Proc. ACM/SIGCOMM Internet Measurement Conf. - IMC 2005
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
3
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha, A., and Park, J.-M.: ' An overview of anomaly detection techniques: existing solutions and latest technological trends ', Comput. Netw., 2007, 51, p. 391-409
-
(2007)
Comput. Netw.
, vol.51
, pp. 391-409
-
-
Patcha, A.1
Park, J.-M.2
-
4
-
-
0038011179
-
Specification based anomaly detection: A new approach for detecting network intrusions
-
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Zhou, S., Tiwari, A., and Yang, H.: ' Specification based anomaly detection: a new approach for detecting network intrusions ', Proc. ACM CCS, 2002
-
(2002)
Proc. ACM CCS
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Zhou, S.5
Tiwari, A.6
Yang, H.7
-
5
-
-
58149490850
-
Information theory based detection against network behavior mimicking DDoS attacks
-
1089-7798
-
Yu, S., Zhou, W., and Doss, R.: ' Information theory based detection against network behavior mimicking DDoS attacks ', IEEE Commun. Lett., 2008, 12, (4), p. 319-321 1089-7798
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.4
, pp. 319-321
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
-
6
-
-
0002408684
-
On measures of entropy and information
-
Rényi, A.: ' On measures of entropy and information ', Proc. Fourth Berkeley Symp, Math. Stat. and Probability, 1961, 1, p. 547-561
-
(1961)
Proc. Fourth Berkeley Symp, Math. Stat. and Probability
, vol.1
, pp. 547-561
-
-
Rényi, A.1
-
7
-
-
0035334271
-
Measuring time-frequency information content using the Renyi entropies
-
0018-9448
-
Baraniuk, R.G., Flandrin, P., Janssen, A.J.E.M., and Michel, O.J.J.: ' Measuring time-frequency information content using the Renyi entropies ', IEEE Trans Inf. Theory, 2001, 47, (4), p. 1391-1409 0018-9448
-
(2001)
IEEE Trans Inf. Theory
, vol.47
, Issue.4
, pp. 1391-1409
-
-
Baraniuk, R.G.1
Flandrin, P.2
Janssen, A.J.E.M.3
Michel, O.J.J.4
-
8
-
-
84856043672
-
A mathematical theory of communication
-
0005-8580 and 623-656
-
Shannon, C.E.: ' A mathematical theory of communication ', Bell Syst. Tech. J., 1948, 27, p. 379-423 and 623-656 0005-8580
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
9
-
-
0347585673
-
Rényi extrapolation of Shannon entropy
-
Karol, Z.: ' Rényi extrapolation of Shannon entropy ', Open Sys. Inf. Dyn., 2003, 10, p. 297-310
-
(2003)
Open Sys. Inf. Dyn.
, vol.10
, pp. 297-310
-
-
Karol, Z.1
-
11
-
-
68149178268
-
IP packet size entropy-based scheme for detection of DoS/DDoS attacks
-
0916-8532
-
Du, P., and Abe, S.: ' IP packet size entropy-based scheme for detection of DoS/DDoS attacks ', IEICE Trans. Inf. Syst., 2008, E91-D, (5), p. 1274-1281 0916-8532
-
(2008)
IEICE Trans. Inf. Syst.
, vol.E91-D
, Issue.5
, pp. 1274-1281
-
-
Du, P.1
Abe, S.2
-
12
-
-
0002974997
-
Synthesis of fractional Gaussian noise using linear approximation for generating self-similar network traffic
-
0146-4833
-
Ledesma, S., and Liu, D.: ' Synthesis of fractional Gaussian noise using linear approximation for generating self-similar network traffic ', Comput. Commun. Rev., 2000, 30, p. 3448-3470 0146-4833
-
(2000)
Comput. Commun. Rev.
, vol.30
, pp. 3448-3470
-
-
Ledesma, S.1
Liu, D.2
-
13
-
-
0035339968
-
Nth-order fractional Brownian motion and fractional Gaussian noises
-
1053-587X
-
Perrin, E., Harba, R., Berzin-Joseph, C., Iribarren, I., and Bonami, A.: ' nth-order fractional Brownian motion and fractional Gaussian noises ', IEEE Trans. Signal Process., 2001, 45, p. 1049-1059 1053-587X
-
(2001)
IEEE Trans. Signal Process.
, vol.45
, pp. 1049-1059
-
-
Perrin, E.1
Harba, R.2
Berzin-Joseph, C.3
Iribarren, I.4
Bonami, A.5
-
15
-
-
68349127686
-
-
Bao Y., Krim H.: 'Renyi entropy based divergence measures for ICA'. IEEE Workshoon Statistical Signal Processing, 28 September-1 October 2003, 565-568
-
Bao Y., Krim H.: 'Renyi entropy based divergence measures for ICA'. IEEE Workshop on Statistical Signal Processing, 28 September-1 October 2003, pp. 565-568
-
-
-
-
16
-
-
0036859273
-
Fast and exact synthesis for 1-D Fractional Brownian motion and fractional Gaussian noises
-
1070-9908
-
Perrin, E., Harba, R., Jennane, R., and Iribarren, I.: ' Fast and exact synthesis for 1-D Fractional Brownian motion and fractional Gaussian noises ', IEEE Signal Process. Lett., 2002, 9, p. 382-384 1070-9908
-
(2002)
IEEE Signal Process. Lett.
, vol.9
, pp. 382-384
-
-
Perrin, E.1
Harba, R.2
Jennane, R.3
Iribarren, I.4
-
18
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
et al. 1045-9219
-
Yu, C., Kai, H., and Ku, W.-S.: et al. ' Collaborative detection of DDoS attacks over multiple network domains ', IEEE Trans Parallel Distrib. Syst., 2007, 18, (12), p. 1649-1662 1045-9219
-
(2007)
IEEE Trans Parallel Distrib. Syst.
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Yu, C.1
Kai, H.2
Ku, W.-S.3
-
19
-
-
34548183355
-
-
Proceedings of the 2007 Int. Conf. on Signal Processing, Communications and Networking (ICSCN'07), 2007, 331-337
-
Kumar, K., Joshi, R.C., and Singh, K.: ' A distributed approach using entropy to detect DDoS attacks in ISP domain ', Proceedings of the 2007 Int. Conf. on Signal Processing, Communications and Networking (ICSCN'07), 2007, pp. 331-337
-
A Distributed Approach Using Entropy to Detect DDoS Attacks in ISP Domain
-
-
Kumar, K.1
Joshi, R.C.2
Singh, K.3
-
20
-
-
41749090011
-
On some entropy functionals derived from Rényi information divergence
-
Bercher, J.-F.: ' On some entropy functionals derived from Rényi information divergence ', Inf. Sci., 2008, 178, (12), p. 2489-2506
-
(2008)
Inf. Sci.
, vol.178
, Issue.12
, pp. 2489-2506
-
-
Bercher, J.-F.1
-
21
-
-
70450145842
-
-
http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/ 2000/LLS-DDOS-2.0.2.html
-
-
-
-
22
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh, J.: ' Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory ', ACM Trans. Inf. Syst. Secur. (TISSEC), 2000, 3, (4), p. 262-294
-
(2000)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
|