메뉴 건너뛰기




Volumn , Issue , 2009, Pages 443-447

ARM-CPD: Detecting SYN flooding attack by traffic prediction

Author keywords

ARIMA; CUSUM; DoS; TCP SYN flooding

Indexed keywords

ACCESS PATTERNS; AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS; CUMULATIVE SUM ALGORITHMS; CUSUM; DETECTION METHODS; DETECTION TIME; NON-PARAMETRIC; REAL TIME; SYN FLOODING ATTACK; TCP SYN FLOODING; TRACE DRIVEN SIMULATION; TRAFFIC PREDICTION;

EID: 74549174089     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICBNMT.2009.5348532     Document Type: Conference Paper
Times cited : (4)

References (17)
  • 5
    • 33646423315 scopus 로고    scopus 로고
    • Application of Anomaly Detect Algorithms for Detecting SYN Flooding Attack
    • V. A. Siris, Fotini P. Application of Anomaly Detect Algorithms for Detecting SYN Flooding Attack. Elsevier Computer Communications, 29: 1433-1442, 2006.
    • (2006) Elsevier Computer Communications , vol.29 , pp. 1433-1442
    • Siris, V.A.1    Fotini, P.2
  • 7
    • 58149102866 scopus 로고    scopus 로고
    • Detecting SYN Flooding Agents under Any Type of IP Spoofing . ICEBE archive
    • IEEE International Conference on e-Business Engineering table of contents
    • Dalia Nashat,Xiaohong Jiang,Susumu Horiguchi.Detecting SYN Flooding Agents under Any Type of IP Spoofing . ICEBE archive Proceedings of the 2008 IEEE International Conference on e-Business Engineering table of contents.
    • (2008) Proceedings of the
    • Dalia Nashat, X.J.1    Horiguchi, S.2
  • 8
    • 39049163945 scopus 로고    scopus 로고
    • D-SAT: Detecting SYN flooding attack by two-stage statistical approach
    • Pages
    • Seung-won Shin, Ki-young Kim, Jong-soo Jang.D-SAT: detecting SYN flooding attack by two-stage statistical approach. Applications and the Internet, 2005, Page(s):430 - 436.
    • (2005) Applications and the Internet , pp. 430-436
    • Shin, S.-W.1    Kim, K.-Y.2    Jang, J.-S.3
  • 9
    • 18144369239 scopus 로고    scopus 로고
    • Haggerty, J., Berry, T., Shi, Q., Merabti, M..DiDDeM: a system for early detection of TCP SYN flood attacks. GLOBECOM 2004.
    • Haggerty, J., Berry, T., Shi, Q., Merabti, M..DiDDeM: a system for early detection of TCP SYN flood attacks. GLOBECOM 2004.
  • 10
    • 34147099073 scopus 로고    scopus 로고
    • Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems
    • Tao Peng, Christopher Leckie, Kotagiri Rammamohanarao. Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Computing Surveys Vol. 39, Issue 1. 2007.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Rammamohanarao, K.3
  • 11
    • 51849112541 scopus 로고    scopus 로고
    • Taxonomy of DDoS Attack and DDoS Defense Mechanisms
    • Jelena Mirkovic and Peter Reiher. Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM 2004.
    • (2004) ACM SIGCOMM
    • Mirkovic, J.1    Reiher, P.2
  • 12
    • 56649089980 scopus 로고    scopus 로고
    • Guiyi Wei, Ye Gu, Yun Ling.An Early Stage Detecting Method against SYN Flooding Attack.Computer Science and its Applications, 2008.
    • Guiyi Wei, Ye Gu, Yun Ling.An Early Stage Detecting Method against SYN Flooding Attack.Computer Science and its Applications, 2008.
  • 13
    • 23944521338 scopus 로고    scopus 로고
    • Bin Xiao, Wei Chen, Yanxiang He, Sha, E.H.-M.. An active detecting method against SYN flooding attack.Parallel and Distributed Systems, 2005.
    • Bin Xiao, Wei Chen, Yanxiang He, Sha, E.H.-M.. An active detecting method against SYN flooding attack.Parallel and Distributed Systems, 2005.
  • 14
    • 0041513496 scopus 로고    scopus 로고
    • Diot, C..Long-term forecasting of Internet backbone traffic: Observations and initial models
    • Papagiannaki, K.,Taft, N., Zhang, Z.-L., Diot, C..Long-term forecasting of Internet backbone traffic: observations and initial models. INFOCOM 2003.
    • INFOCOM 2003
    • Papagiannaki, K.1    Taft, N.2    Zhang, Z.-L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.