-
1
-
-
73849090508
-
Internet Denial of Service: Attack and defense Mechanisms
-
Dec
-
J. Mirkovic, S. Dietrich, D. Dittrich, and P. Reiher, "Internet Denial of Service: attack and defense Mechanisms," Prentice Hall PTR, Dec. 2000.
-
(2000)
Prentice Hall PTR
-
-
Mirkovic, J.1
Dietrich, S.2
Dittrich, D.3
Reiher, P.4
-
2
-
-
85084161486
-
Inferring internet denial-ofservice activity
-
D. Moore, G. M. Voelker, and S. Savage, "Inferring internet denial-ofservice activity," Proc. Usenix Security Symp, Usenix Assoc., 2001. http://citeseer.ist.psu.edu/moore 01inferring.html
-
(2001)
Proc. Usenix Security Symp, Usenix Assoc
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
3
-
-
0041488497
-
-
CERT
-
CERT, "Overview of attack trends," http://www. cert.org/archive/pdf/attack-trends.pdf, 2002.
-
(2002)
Overview of attack trends
-
-
-
5
-
-
33947658917
-
Distributed Denial-of-service and Intrusion Detection
-
Editorial, "Distributed Denial-of-service and Intrusion Detection," Journal of Network and Computer Applications, vol. 30, 2007, pp. 819-822.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 819-822
-
-
Editorial1
-
6
-
-
31544436627
-
Denial-of-service attack detection techniques
-
G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, "Denial-of-service attack detection techniques," IEEE Internet Computing, vol.10, no. 1, 2006, pp. 82-89.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
7
-
-
0033713861
-
Implementing enhanced network maintenance for transaction access services: Tools and applications
-
S. Papavassiliou, M. Pace, and L. Ho, "Implementing enhanced network maintenance for transaction access services: Tools and applications," IEEE International Conference on Communications, vol. 1, 2000, pp. 211- 215
-
(2000)
IEEE International Conference on Communications
, vol.1
, pp. 211-215
-
-
Papavassiliou, S.1
Pace, M.2
Ho, L.3
-
8
-
-
22944438123
-
Protocol anomaly and pattern matching based intrusion detection system
-
D. H. Kang, B. K. Kim, and J. T. Oh, "Protocol anomaly and pattern matching based intrusion detection system," WSEAS Transactions on Communication, vol.4, no. 10, 2005, pp. 994-1101.
-
(2005)
WSEAS Transactions on Communication
, vol.4
, Issue.10
, pp. 994-1101
-
-
Kang, D.H.1
Kim, B.K.2
Oh, J.T.3
-
9
-
-
0043166339
-
Anomaly detection in ip networks
-
M. Thottan and J. Chuanyi, "Anomaly detection in ip networks," IEEE Trans. on Signal Processing, vol. 51, no. 8, 2003, pp. 2191-2204.
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Chuanyi, J.2
-
10
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
L. Feinstein, and et al., "Statistical approaches to DDoS attack detection and response," Proc., DARPA information survivability conference and exposition proceedings, vol. 1, 2003, pp. 303-314.
-
(2003)
Proc., DARPA information survivability conference and exposition proceedings
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
and et, al.2
-
11
-
-
8344244591
-
An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition
-
M. Li, "An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition," Computers & Security, vol. 23, 2004, pp. 549-558.
-
(2004)
Computers & Security
, vol.23
, pp. 549-558
-
-
Li, M.1
-
12
-
-
59249106247
-
DDoS attacks detection model and its application
-
M. H. Li, M. Li, and X. Y. Jiang, "DDoS attacks detection model and its application," WSEAS Transactions on Computers, Issue 8, vol. 7, 2008, pp. 1159-168.
-
(2008)
WSEAS Transactions on Computers
, vol.7
, Issue.8
, pp. 1159-1168
-
-
Li, M.H.1
Li, M.2
Jiang, X.Y.3
-
13
-
-
33646900187
-
Change trend of averaged Hurst parameter of traffic under DDoS flood attacks
-
M. Li, "Change trend of averaged Hurst parameter of traffic under DDoS flood attacks," Computers & Security, vol. 25, no. 3, 2006, pp. 213-220.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 213-220
-
-
Li, M.1
-
14
-
-
85032752116
-
Multiscale nature of network traffic
-
P. Abrey, R. Baraniuk, P. Flaudrin, R. Riedi, and D. Veitch, "Multiscale nature of network traffic," IEEE Signal Processing Magazine, 2002, pp. 28-46.
-
(2002)
IEEE Signal Processing Magazine
, pp. 28-46
-
-
Abrey, P.1
Baraniuk, R.2
Flaudrin, P.3
Riedi, R.4
Veitch, D.5
-
16
-
-
18144394485
-
WADES: A tool for distributed denial of service attack detection,
-
M.S. thesis Texas A&M University, College Station, Tex, USA
-
A. Ramanarran, "WADES: a tool for distributed denial of service attack detection," M.S. thesis Texas A&M University, College Station, Tex, USA, 2002.
-
(2002)
-
-
Ramanarran, A.1
-
18
-
-
33751110003
-
Wavelet based denial-of-service detection
-
G. Carl, R. R. Brooks, and S. Rai, "Wavelet based denial-of-service detection," Computers & Security, vol. 25, 2006, pp. 600-615.
-
(2006)
Computers & Security
, vol.25
, pp. 600-615
-
-
Carl, G.1
Brooks, R.R.2
Rai, S.3
-
19
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseille, France
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," Proceedings of ACM SIGCOMM, Marseille, France, 2002, pp. 71-82.
-
(2002)
Proceedings of ACM SIGCOMM
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
20
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies," SIGCOMM '04, vol. 34, Issue 4, 2004, pp. 219-230.
-
(2004)
SIGCOMM '04
, vol.34
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
21
-
-
85073636432
-
The identification and correction of outline based on wavelet transformation of traffic flow
-
Beijing, China
-
B. Liu, Y. Li, Y. Hou, and X. Sui. "The identification and correction of outline based on wavelet transformation of traffic flow," Proceedings of the 2007 International Conference on Wavelet Analysis and Pattern Recognition, Beijing, China, 2007, pp. 2-4.
-
(2007)
Proceedings of the 2007 International Conference on Wavelet Analysis and Pattern Recognition
, pp. 2-4
-
-
Liu, B.1
Li, Y.2
Hou, Y.3
Sui, X.4
-
22
-
-
33845536096
-
Detecting traffic anomalies through aggregate analysis of packet header data
-
Greece
-
S. S. Kim, A. L. N. Reddy, and M. Vannucci, "Detecting traffic anomalies through aggregate analysis of packet header data," International IFIT-TC6 Networking Conference, Greece, vol. 3042, 2004, pp. 1047-1059.
-
(2004)
International IFIT-TC6 Networking Conference
, vol.3042
, pp. 1047-1059
-
-
Kim, S.S.1
Reddy, A.L.N.2
Vannucci, M.3
-
23
-
-
73849115210
-
A reliable anomaly detector against low-rate DDOS attack,
-
K.-L. Tian and M. Li, "A reliable anomaly detector against low-rate DDOS attack," in press, International Journal of Electronics and Computers, vol. 1, no. 1, 2009, pp. 1-6.
-
(2009)
International Journal of Electronics and Computers
, vol.1
, Issue.1
, pp. 1-6
-
-
Tian, K.-L.1
Li, M.2
-
24
-
-
52949154286
-
Detection of variations of local irregularity of traffic under DDOS flood attack
-
M. Li and W. Zhao, "Detection of variations of local irregularity of traffic under DDOS flood attack," Mathematical Problems in Engineering, Vol. 2008, 2008.
-
(2008)
Mathematical Problems in Engineering
, vol.2008
-
-
Li, M.1
Zhao, W.2
-
25
-
-
39649123983
-
Modeling network traffic using generalized Cauchy process
-
M. Li and S. C. Lim, "Modeling network traffic using generalized Cauchy process," Physica A, vol. 387, no. 11, 2008, pp. 2584-2594.
-
(2008)
Physica A
, vol.387
, Issue.11
, pp. 2584-2594
-
-
Li, M.1
Lim, S.C.2
-
26
-
-
48249114460
-
Investigating multi-fractality of network traffic using local Hurst function
-
M. Li, S. C. Lim, and W. Zhao, "Investigating multi-fractality of network traffic using local Hurst function," Advanced Studies in Theoretical Physics, vol. 2, no. 10, 2008, pp. 479-490.
-
(2008)
Advanced Studies in Theoretical Physics
, vol.2
, Issue.10
, pp. 479-490
-
-
Li, M.1
Lim, S.C.2
Zhao, W.3
|