메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A new approach for detecting DDoS attacks based on wavelet analysis

Author keywords

DDoS attack; Detection; Model; Wavelet transform

Indexed keywords

ABRUPT CHANGE; DDOS ATTACK; DISTRIBUTED DENIAL OF SERVICE ATTACK; FALSE ALARMS; NEW APPROACHES; SECURITY PROBLEMS;

EID: 73849116400     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISP.2009.5300903     Document Type: Conference Paper
Times cited : (15)

References (26)
  • 3
    • 0041488497 scopus 로고    scopus 로고
    • CERT
    • CERT, "Overview of attack trends," http://www. cert.org/archive/pdf/attack-trends.pdf, 2002.
    • (2002) Overview of attack trends
  • 5
    • 33947658917 scopus 로고    scopus 로고
    • Distributed Denial-of-service and Intrusion Detection
    • Editorial, "Distributed Denial-of-service and Intrusion Detection," Journal of Network and Computer Applications, vol. 30, 2007, pp. 819-822.
    • (2007) Journal of Network and Computer Applications , vol.30 , pp. 819-822
    • Editorial1
  • 6
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-service attack detection techniques
    • G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, "Denial-of-service attack detection techniques," IEEE Internet Computing, vol.10, no. 1, 2006, pp. 82-89.
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.R.3    Rai, S.4
  • 7
    • 0033713861 scopus 로고    scopus 로고
    • Implementing enhanced network maintenance for transaction access services: Tools and applications
    • S. Papavassiliou, M. Pace, and L. Ho, "Implementing enhanced network maintenance for transaction access services: Tools and applications," IEEE International Conference on Communications, vol. 1, 2000, pp. 211- 215
    • (2000) IEEE International Conference on Communications , vol.1 , pp. 211-215
    • Papavassiliou, S.1    Pace, M.2    Ho, L.3
  • 8
    • 22944438123 scopus 로고    scopus 로고
    • Protocol anomaly and pattern matching based intrusion detection system
    • D. H. Kang, B. K. Kim, and J. T. Oh, "Protocol anomaly and pattern matching based intrusion detection system," WSEAS Transactions on Communication, vol.4, no. 10, 2005, pp. 994-1101.
    • (2005) WSEAS Transactions on Communication , vol.4 , Issue.10 , pp. 994-1101
    • Kang, D.H.1    Kim, B.K.2    Oh, J.T.3
  • 9
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in ip networks
    • M. Thottan and J. Chuanyi, "Anomaly detection in ip networks," IEEE Trans. on Signal Processing, vol. 51, no. 8, 2003, pp. 2191-2204.
    • (2003) IEEE Trans. on Signal Processing , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Chuanyi, J.2
  • 11
    • 8344244591 scopus 로고    scopus 로고
    • An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition
    • M. Li, "An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition," Computers & Security, vol. 23, 2004, pp. 549-558.
    • (2004) Computers & Security , vol.23 , pp. 549-558
    • Li, M.1
  • 12
    • 59249106247 scopus 로고    scopus 로고
    • DDoS attacks detection model and its application
    • M. H. Li, M. Li, and X. Y. Jiang, "DDoS attacks detection model and its application," WSEAS Transactions on Computers, Issue 8, vol. 7, 2008, pp. 1159-168.
    • (2008) WSEAS Transactions on Computers , vol.7 , Issue.8 , pp. 1159-1168
    • Li, M.H.1    Li, M.2    Jiang, X.Y.3
  • 13
    • 33646900187 scopus 로고    scopus 로고
    • Change trend of averaged Hurst parameter of traffic under DDoS flood attacks
    • M. Li, "Change trend of averaged Hurst parameter of traffic under DDoS flood attacks," Computers & Security, vol. 25, no. 3, 2006, pp. 213-220.
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 213-220
    • Li, M.1
  • 16
    • 18144394485 scopus 로고    scopus 로고
    • WADES: A tool for distributed denial of service attack detection,
    • M.S. thesis Texas A&M University, College Station, Tex, USA
    • A. Ramanarran, "WADES: a tool for distributed denial of service attack detection," M.S. thesis Texas A&M University, College Station, Tex, USA, 2002.
    • (2002)
    • Ramanarran, A.1
  • 18
    • 33751110003 scopus 로고    scopus 로고
    • Wavelet based denial-of-service detection
    • G. Carl, R. R. Brooks, and S. Rai, "Wavelet based denial-of-service detection," Computers & Security, vol. 25, 2006, pp. 600-615.
    • (2006) Computers & Security , vol.25 , pp. 600-615
    • Carl, G.1    Brooks, R.R.2    Rai, S.3
  • 19
    • 0141427794 scopus 로고    scopus 로고
    • A signal analysis of network traffic anomalies
    • Marseille, France
    • P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," Proceedings of ACM SIGCOMM, Marseille, France, 2002, pp. 71-82.
    • (2002) Proceedings of ACM SIGCOMM , pp. 71-82
    • Barford, P.1    Kline, J.2    Plonka, D.3    Ron, A.4
  • 20
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies," SIGCOMM '04, vol. 34, Issue 4, 2004, pp. 219-230.
    • (2004) SIGCOMM '04 , vol.34 , Issue.4 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 22
    • 33845536096 scopus 로고    scopus 로고
    • Detecting traffic anomalies through aggregate analysis of packet header data
    • Greece
    • S. S. Kim, A. L. N. Reddy, and M. Vannucci, "Detecting traffic anomalies through aggregate analysis of packet header data," International IFIT-TC6 Networking Conference, Greece, vol. 3042, 2004, pp. 1047-1059.
    • (2004) International IFIT-TC6 Networking Conference , vol.3042 , pp. 1047-1059
    • Kim, S.S.1    Reddy, A.L.N.2    Vannucci, M.3
  • 23
    • 73849115210 scopus 로고    scopus 로고
    • A reliable anomaly detector against low-rate DDOS attack,
    • K.-L. Tian and M. Li, "A reliable anomaly detector against low-rate DDOS attack," in press, International Journal of Electronics and Computers, vol. 1, no. 1, 2009, pp. 1-6.
    • (2009) International Journal of Electronics and Computers , vol.1 , Issue.1 , pp. 1-6
    • Tian, K.-L.1    Li, M.2
  • 24
    • 52949154286 scopus 로고    scopus 로고
    • Detection of variations of local irregularity of traffic under DDOS flood attack
    • M. Li and W. Zhao, "Detection of variations of local irregularity of traffic under DDOS flood attack," Mathematical Problems in Engineering, Vol. 2008, 2008.
    • (2008) Mathematical Problems in Engineering , vol.2008
    • Li, M.1    Zhao, W.2
  • 25
    • 39649123983 scopus 로고    scopus 로고
    • Modeling network traffic using generalized Cauchy process
    • M. Li and S. C. Lim, "Modeling network traffic using generalized Cauchy process," Physica A, vol. 387, no. 11, 2008, pp. 2584-2594.
    • (2008) Physica A , vol.387 , Issue.11 , pp. 2584-2594
    • Li, M.1    Lim, S.C.2
  • 26
    • 48249114460 scopus 로고    scopus 로고
    • Investigating multi-fractality of network traffic using local Hurst function
    • M. Li, S. C. Lim, and W. Zhao, "Investigating multi-fractality of network traffic using local Hurst function," Advanced Studies in Theoretical Physics, vol. 2, no. 10, 2008, pp. 479-490.
    • (2008) Advanced Studies in Theoretical Physics , vol.2 , Issue.10 , pp. 479-490
    • Li, M.1    Lim, S.C.2    Zhao, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.