메뉴 건너뛰기




Volumn , Issue , 2009, Pages 351-356

Discriminating DDoS flows from flash crowds using information distance

Author keywords

DDoS attack; Distance; Measurement

Indexed keywords

ATTACK FLOW; ATTACK STRATEGIES; DDOS ATTACK; DISTANCE METRICS; FEATURE-BASED ALGORITHM; FLASH CROWD; HELLINGER DISTANCE; INFORMATION DISTANCE; NETWORK TRAFFIC; ORIGINAL DESIGN; RANDOMLY DISTRIBUTED; REAL DATA SETS;

EID: 72849125444     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2009.29     Document Type: Conference Paper
Times cited : (70)

References (29)
  • 2
    • 1642535783 scopus 로고    scopus 로고
    • A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
    • IEEE CS Press, June
    • R.B. Blazek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A Novel Approach to Detection of 'Denial-of-Service' Attacks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods", Proc. IEEE Workshop Information Assurance and Security, IEEE CS Press, June 2001, pp. 220-226.
    • (2001) Proc. IEEE Workshop Information Assurance and Security , pp. 220-226
    • Blazek, R.B.1    Kim, H.2    Rozovskii, B.3    Tartakovsky, A.4
  • 4
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-Service Attack Detection Techniques
    • January
    • G. Carl, G. Kesidis, R.R. Brooks, and S. Rai, "Denial-of-Service Attack Detection Techniques", IEEE Internet Computing, Vol. 10, No. 1, January 2006, pp. 82-89.
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.R.3    Rai, S.4
  • 8
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • September, Academic Press, Orlando, pp
    • Y. Chen and K. Hwang, "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis", Journal of Parallel and Distributed Computing, Vol. 66, No. 9, September 2006, Academic Press, Orlando, pp. 1137-1151.
    • (2006) Journal of Parallel and Distributed Computing , vol.66 , Issue.9 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 11
    • 39049125624 scopus 로고    scopus 로고
    • Controlling IP Spoofing through Interdomain Packet Filters
    • January-March
    • Z. Duan, X. Yuan and J. Chandrashekar, "Controlling IP Spoofing through Interdomain Packet Filters", IEEE Trans. on Dependable and Secure Computing, Vol. 5, No. 1, January-March 2008, pp. 22-36.
    • (2008) IEEE Trans. on Dependable and Secure Computing , vol.5 , Issue.1 , pp. 22-36
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 13
    • 72849149867 scopus 로고    scopus 로고
    • Distributed Reflection Denial of Service Description and Analysis of a Potent, Increasingly Prevalent, and Worrisome Internet Attack
    • Research Corporation, February 2002
    • S. Gibson, "Distributed Reflection Denial of Service Description and Analysis of a Potent, Increasingly Prevalent, and Worrisome Internet Attack", Gibson Research Corporation, February 2002. http://grc.com/dos/drdos.htm
    • Gibson
    • Gibson, S.1
  • 14
    • 25844458510 scopus 로고    scopus 로고
    • Reduction of Quality (RoQ) Attacks on Internet End Systems
    • March
    • M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang, "Reduction of Quality (RoQ) Attacks on Internet End Systems", Proc. IEEE INFOCOM, Vol. 2, March 2005, pp. 1362-1372.
    • (2005) Proc. IEEE INFOCOM , vol.2 , pp. 1362-1372
    • Guirguis, M.1    Bestavros, A.2    Matta, I.3    Zhang, Y.4
  • 15
    • 77953077374 scopus 로고    scopus 로고
    • Flash Crowds and Denial-of-Service Attacks: Characterization and Implications for CDNs and Web Sites
    • ACM Press, New York, May
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial-of-Service Attacks: Characterization and Implications for CDNs and Web Sites", Proc. International World Wide Web Conferences, ACM Press, New York, May 2002, pp. 293-304.
    • (2002) Proc. International World Wide Web Conferences , pp. 293-304
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 17
    • 35549011836 scopus 로고    scopus 로고
    • Robust and efficient detection of DDoS attacks for large-scale internet
    • September
    • K. Lu, D. Wu, J. Fan, S. Todorovic and A. Nucci, "Robust and efficient detection of DDoS attacks for large-scale internet," Computer Networks, Vol. 51, September 2007, pp. 5036-5056.
    • (2007) Computer Networks , vol.51 , pp. 5036-5056
    • Lu, K.1    Wu, D.2    Fan, J.3    Todorovic, S.4    Nucci, A.5
  • 19
    • 72849126026 scopus 로고    scopus 로고
    • Lincoln Laboratory Scenario (DDoS) 1.0
    • MIT Lincoln Laboratory
    • MIT Lincoln Laboratory, "Lincoln Laboratory Scenario (DDoS) 1.0", Massachusetts Institute of Technology (MIT), 1999. http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/2000/ LLS-DDOS-1.0.html
    • (1999) Massachusetts Institute of Technology (MIT)
  • 20
    • 72849117217 scopus 로고    scopus 로고
    • Auckland-VIII
    • Passive Measurement and Analysis (PMA) Project, December
    • Passive Measurement and Analysis (PMA) Project "Auckland-VIII", The National Laboratory for Applied Network Research (NLANR), December 2003. http://pma.nlanr.net/Special/auck8.html
    • (2003) The National Laboratory for Applied Network Research (NLANR)
  • 23
    • 72849134523 scopus 로고    scopus 로고
    • Cybersleuthing solves the case
    • 14 January 2002
    • D. Radcliff, "Cybersleuthing solves the case", Computerworld, 14 January 2002. http://www.paypal.com/html/computerworld- 011402.html
    • Computerworld
    • Radcliff, D.1
  • 24
    • 34147099073 scopus 로고    scopus 로고
    • Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems
    • April
    • T. Peng, C. Leckie and K. Ramamohanarao, "Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems", ACM Computing Surveys, Vol. 39, No. 1, April 2007.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 26
    • 14644397228 scopus 로고    scopus 로고
    • Change-Point Monitoring for the Detection of DoS Attacks
    • October-December
    • H. Wang, D. Zhang and K.G. Shin, "Change-Point Monitoring for the Detection of DoS Attacks", IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 4, October-December 2004. pp. 193-208.
    • (2004) IEEE Transactions on Dependable and Secure Computing , vol.1 , Issue.4 , pp. 193-208
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 27
    • 33947503628 scopus 로고    scopus 로고
    • Defense Against Spoofed IP Traffic Using Hop-Count Filtering
    • February
    • H. Wang, C. Jin, and K.G. Shin, "Defense Against Spoofed IP Traffic Using Hop-Count Filtering", IEEE/ACM Transactions on Networking, Vol. 15, No. 1, February 2007, pp. 40-53.
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 29
    • 58149490850 scopus 로고    scopus 로고
    • Information Theory Based Detection Against Network Behavior Mimicking DDoS Attack
    • April
    • S. Yu, W. Zhou and R. Doss, "Information Theory Based Detection Against Network Behavior Mimicking DDoS Attack", IEEE Communications Letters, Vol. 12, No. 4, April 2008, pp. 319-321.
    • (2008) IEEE Communications Letters , vol.12 , Issue.4 , pp. 319-321
    • Yu, S.1    Zhou, W.2    Doss, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.