-
4
-
-
43949089487
-
A robust scheme to detect SYN flooding attacks
-
Sun, Changhua, Fan, Jindou, Liu, Bin.A robust scheme to detect SYN flooding attacks. Proceedings of the Second International Conference on Communications and Networking in China, ChinaCom 2007.
-
(2007)
Proceedings of the Second International Conference on Communications and Networking in China, ChinaCom
-
-
Sun, C.1
Fan, J.2
Liu, B.3
-
5
-
-
33646423315
-
Application of Anomaly Detect Algorithms for Detecting SYN Flooding Attack
-
V. A. Siris, Fotini P. Application of Anomaly Detect Algorithms for Detecting SYN Flooding Attack. Elsevier Computer Communications, 29: 1433-1442, 2006.
-
(2006)
Elsevier Computer Communications
, vol.29
, pp. 1433-1442
-
-
Siris, V.A.1
Fotini, P.2
-
7
-
-
58149102866
-
Detecting SYN Flooding Agents under Any Type of IP Spoofing . ICEBE archive
-
IEEE International Conference on e-Business Engineering table of contents
-
Dalia Nashat,Xiaohong Jiang,Susumu Horiguchi.Detecting SYN Flooding Agents under Any Type of IP Spoofing . ICEBE archive Proceedings of the 2008 IEEE International Conference on e-Business Engineering table of contents.
-
(2008)
Proceedings of the
-
-
Dalia Nashat, X.J.1
Horiguchi, S.2
-
8
-
-
39049163945
-
D-SAT: Detecting SYN flooding attack by two-stage statistical approach
-
Pages
-
Seung-won Shin, Ki-young Kim, Jong-soo Jang.D-SAT: detecting SYN flooding attack by two-stage statistical approach. Applications and the Internet, 2005, Page(s):430 - 436.
-
(2005)
Applications and the Internet
, pp. 430-436
-
-
Shin, S.-W.1
Kim, K.-Y.2
Jang, J.-S.3
-
9
-
-
18144369239
-
-
Haggerty, J., Berry, T., Shi, Q., Merabti, M..DiDDeM: a system for early detection of TCP SYN flood attacks. GLOBECOM 2004.
-
Haggerty, J., Berry, T., Shi, Q., Merabti, M..DiDDeM: a system for early detection of TCP SYN flood attacks. GLOBECOM 2004.
-
-
-
-
10
-
-
34147099073
-
Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems
-
Tao Peng, Christopher Leckie, Kotagiri Rammamohanarao. Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Computing Surveys Vol. 39, Issue 1. 2007.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Rammamohanarao, K.3
-
11
-
-
51849112541
-
Taxonomy of DDoS Attack and DDoS Defense Mechanisms
-
Jelena Mirkovic and Peter Reiher. Taxonomy of DDoS Attack and DDoS Defense Mechanisms. ACM SIGCOMM 2004.
-
(2004)
ACM SIGCOMM
-
-
Mirkovic, J.1
Reiher, P.2
-
12
-
-
56649089980
-
-
Guiyi Wei, Ye Gu, Yun Ling.An Early Stage Detecting Method against SYN Flooding Attack.Computer Science and its Applications, 2008.
-
Guiyi Wei, Ye Gu, Yun Ling.An Early Stage Detecting Method against SYN Flooding Attack.Computer Science and its Applications, 2008.
-
-
-
-
13
-
-
23944521338
-
-
Bin Xiao, Wei Chen, Yanxiang He, Sha, E.H.-M.. An active detecting method against SYN flooding attack.Parallel and Distributed Systems, 2005.
-
Bin Xiao, Wei Chen, Yanxiang He, Sha, E.H.-M.. An active detecting method against SYN flooding attack.Parallel and Distributed Systems, 2005.
-
-
-
-
14
-
-
0041513496
-
Diot, C..Long-term forecasting of Internet backbone traffic: Observations and initial models
-
Papagiannaki, K.,Taft, N., Zhang, Z.-L., Diot, C..Long-term forecasting of Internet backbone traffic: observations and initial models. INFOCOM 2003.
-
INFOCOM 2003
-
-
Papagiannaki, K.1
Taft, N.2
Zhang, Z.-L.3
|