-
1
-
-
0141427794
-
A Signal Analysis of Network Traffic Anomalies
-
ACM Press, November
-
P. Barford, J. Kline, D. Plonka and A. Ron, "A Signal Analysis of Network Traffic Anomalies", Proc. ACM SIGCOMM Internet Measurement Workshop, ACM Press, November 2002, pp. 71-82.
-
(2002)
Proc. ACM SIGCOMM Internet Measurement Workshop
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
2
-
-
1642535783
-
A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
-
IEEE CS Press, June
-
R.B. Blazek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods", Proc. IEEE Workshop Information Assurance and Security, IEEE CS Press, June 2001, pp. 220-226.
-
(2001)
Proc. IEEE Workshop Information Assurance and Security
, pp. 220-226
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
4
-
-
31544436627
-
Denial-of-Service Attack Detection Techniques
-
January
-
G. Carl, G. Kesidis, R.R. Brooks, and S. Rai, "Denial-of-Service Attack Detection Techniques", IEEE Internet Computing, Vol. 10, No. 1, January 2006, pp. 82-89.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
8
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
September, Academic Press, Orlando, pp
-
Y. Chen and K. Hwang, "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis", Journal of Parallel and Distributed Computing, Vol. 66, No. 9, September 2006, Academic Press, Orlando, pp. 1137-1151.
-
(2006)
Journal of Parallel and Distributed Computing
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
11
-
-
39049125624
-
Controlling IP Spoofing through Interdomain Packet Filters
-
January-March
-
Z. Duan, X. Yuan and J. Chandrashekar, "Controlling IP Spoofing through Interdomain Packet Filters", IEEE Trans. on Dependable and Secure Computing, Vol. 5, No. 1, January-March 2008, pp. 22-36.
-
(2008)
IEEE Trans. on Dependable and Secure Computing
, vol.5
, Issue.1
, pp. 22-36
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
12
-
-
84942256107
-
Statistical Approaches to DDoS Attack Detection and Response
-
IEEE CS Press, 22-24 April
-
L. Feinstein, D. Schnackenberg R. Balupari and D. Kindred, "Statistical Approaches to DDoS Attack Detection and Response," Proc. DARPA Information Survivability Conf. and Exposition, Vol. 1, IEEE CS Press, 22-24 April 2003, pp. 303-314.
-
(2003)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
13
-
-
72849149867
-
Distributed Reflection Denial of Service Description and Analysis of a Potent, Increasingly Prevalent, and Worrisome Internet Attack
-
Research Corporation, February 2002
-
S. Gibson, "Distributed Reflection Denial of Service Description and Analysis of a Potent, Increasingly Prevalent, and Worrisome Internet Attack", Gibson Research Corporation, February 2002. http://grc.com/dos/drdos.htm
-
Gibson
-
-
Gibson, S.1
-
14
-
-
25844458510
-
Reduction of Quality (RoQ) Attacks on Internet End Systems
-
March
-
M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang, "Reduction of Quality (RoQ) Attacks on Internet End Systems", Proc. IEEE INFOCOM, Vol. 2, March 2005, pp. 1362-1372.
-
(2005)
Proc. IEEE INFOCOM
, vol.2
, pp. 1362-1372
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.4
-
15
-
-
77953077374
-
Flash Crowds and Denial-of-Service Attacks: Characterization and Implications for CDNs and Web Sites
-
ACM Press, New York, May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial-of-Service Attacks: Characterization and Implications for CDNs and Web Sites", Proc. International World Wide Web Conferences, ACM Press, New York, May 2002, pp. 293-304.
-
(2002)
Proc. International World Wide Web Conferences
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
16
-
-
34548183355
-
A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain
-
February
-
K. Kumar, R.C. Joshi, and K. Singh, "A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain", The International Conference on Signal Processing of Communications and Networking (ICSCN '07), February 2007, pp. 331-337.
-
(2007)
The International Conference on Signal Processing of Communications and Networking (ICSCN '07)
, pp. 331-337
-
-
Kumar, K.1
Joshi, R.C.2
Singh, K.3
-
17
-
-
35549011836
-
Robust and efficient detection of DDoS attacks for large-scale internet
-
September
-
K. Lu, D. Wu, J. Fan, S. Todorovic and A. Nucci, "Robust and efficient detection of DDoS attacks for large-scale internet," Computer Networks, Vol. 51, September 2007, pp. 5036-5056.
-
(2007)
Computer Networks
, vol.51
, pp. 5036-5056
-
-
Lu, K.1
Wu, D.2
Fan, J.3
Todorovic, S.4
Nucci, A.5
-
19
-
-
72849126026
-
Lincoln Laboratory Scenario (DDoS) 1.0
-
MIT Lincoln Laboratory
-
MIT Lincoln Laboratory, "Lincoln Laboratory Scenario (DDoS) 1.0", Massachusetts Institute of Technology (MIT), 1999. http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/2000/ LLS-DDOS-1.0.html
-
(1999)
Massachusetts Institute of Technology (MIT)
-
-
-
20
-
-
72849117217
-
Auckland-VIII
-
Passive Measurement and Analysis (PMA) Project, December
-
Passive Measurement and Analysis (PMA) Project "Auckland-VIII", The National Laboratory for Applied Network Research (NLANR), December 2003. http://pma.nlanr.net/Special/auck8.html
-
(2003)
The National Laboratory for Applied Network Research (NLANR)
-
-
-
21
-
-
85084161486
-
Inferring Internet Denial-of-Service Activity
-
USENIX Association, August
-
D. Moore, G.M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," Proc. 2001 USENIX Security Symposium, Vol. 10, USENIX Association, August 2001.
-
(2001)
Proc. 2001 USENIX Security Symposium
, vol.10
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
22
-
-
33847730651
-
Distributed Denial of Service Attacks
-
December
-
C. Patrikakis, M. Masikos, and O. Zouraraki, "Distributed Denial of Service Attacks", The Internet Protocol Journal, Vol. 7, No. 4, December 2004.
-
(2004)
The Internet Protocol Journal
, vol.7
, Issue.4
-
-
Patrikakis, C.1
Masikos, M.2
Zouraraki, O.3
-
23
-
-
72849134523
-
Cybersleuthing solves the case
-
14 January 2002
-
D. Radcliff, "Cybersleuthing solves the case", Computerworld, 14 January 2002. http://www.paypal.com/html/computerworld- 011402.html
-
Computerworld
-
-
Radcliff, D.1
-
24
-
-
34147099073
-
Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems
-
April
-
T. Peng, C. Leckie and K. Ramamohanarao, "Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems", ACM Computing Surveys, Vol. 39, No. 1, April 2007.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
25
-
-
44049088453
-
Detecting VoIP Floods Using the Hellinger Distance
-
June
-
H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, "Detecting VoIP Floods Using the Hellinger Distance", IEEE Transactions on Parallel and Distributed Systems, Vol. 19, No. 6, June 2008. pp. 794-805.
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.6
, pp. 794-805
-
-
Sengar, H.1
Wang, H.2
Wijesekera, D.3
Jajodia, S.4
-
26
-
-
14644397228
-
Change-Point Monitoring for the Detection of DoS Attacks
-
October-December
-
H. Wang, D. Zhang and K.G. Shin, "Change-Point Monitoring for the Detection of DoS Attacks", IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 4, October-December 2004. pp. 193-208.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
27
-
-
33947503628
-
Defense Against Spoofed IP Traffic Using Hop-Count Filtering
-
February
-
H. Wang, C. Jin, and K.G. Shin, "Defense Against Spoofed IP Traffic Using Hop-Count Filtering", IEEE/ACM Transactions on Networking, Vol. 15, No. 1, February 2007, pp. 40-53.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
28
-
-
72849110028
-
Source-Based Filtering Algorithm Against DDOS Attacks
-
December
-
F. Yi, S. Yu, W. Zhou, J. Hai, and A. Bonti, "Source-Based Filtering Algorithm Against DDOS Attacks", International Journal of Database Theory and Application, Vol. 1, No. 1, December 2008, pp. 9-20.
-
(2008)
International Journal of Database Theory and Application
, vol.1
, Issue.1
, pp. 9-20
-
-
Yi, F.1
Yu, S.2
Zhou, W.3
Hai, J.4
Bonti, A.5
-
29
-
-
58149490850
-
Information Theory Based Detection Against Network Behavior Mimicking DDoS Attack
-
April
-
S. Yu, W. Zhou and R. Doss, "Information Theory Based Detection Against Network Behavior Mimicking DDoS Attack", IEEE Communications Letters, Vol. 12, No. 4, April 2008, pp. 319-321.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.4
, pp. 319-321
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
|