-
2
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
IEEE Computer Society
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP," in Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 1997, p. 208.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 208
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
3
-
-
1642535783
-
A novel approach to detection of denial of service attacks via adaptive sequential and batch sequential change point detection methods
-
R. B. Blazek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A novel approach to detection of denial of service attacks via adaptive sequential and batch sequential change point detection methods," in Workshop on Information Assurance and Security, IEEE, June 2001.
-
Workshop on Information Assurance and Security, IEEE, June 2001
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
Tartakovsky, A.4
-
6
-
-
18144385431
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
December
-
V. A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," in IEEE, GlobeCom, December 2004.
-
(2004)
IEEE, GlobeCom
-
-
Siris, V.A.1
Papagalou, F.2
-
7
-
-
18144375196
-
Detecting distributed denial-of-service attacks by analyzing TCP SYN Packets statistically
-
December
-
Y. O. M. Murata and S. Ata, "Detecting distributed denial-of-service attacks by analyzing TCP SYN Packets statistically," in IEEE, GlobeCom, December 2004.
-
(2004)
IEEE, GlobeCom
-
-
Murata, Y.O.M.1
Ata, S.2
-
9
-
-
23944521338
-
An active detecting method against SYN flooding attack
-
B. Xiao, W. Chen, Y. He, and S. E.H.-M., "An active detecting method against SYN flooding attack," in Proceedings. 11th International Conference on Parallel and Distributed Systems, July 2005.
-
Proceedings. 11th International Conference on Parallel and Distributed Systems, July 2005
-
-
Xiao, B.1
Chen, W.2
He, Y.3
E.H-M, S.4
-
10
-
-
39049163945
-
D-SAT: Detecting SYN flooding attack by two-stage statistical approach
-
S.-W. Shin, K.-Y. Kim, and J.-S. Jang, "D-SAT: detecting SYN flooding attack by two-stage statistical approach," in The Symposium on Applications and the Internet, IEEE, Janurary 2005.
-
The Symposium on Applications and the Internet, IEEE, Janurary 2005
-
-
Shin, S.-W.1
Kim, K.-Y.2
Jang, J.-S.3
-
12
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
July
-
R. Mahajan, S. Bellovin, S. Floyd, J. Vern, and P. Scott, "Controlling high bandwidth aggregates in the network," in Computer Communications Review, July 2002.
-
(2002)
Computer Communications Review
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Vern, J.4
Scott, P.5
-
13
-
-
77951546862
-
Monitoring TCP handshakes on DDoS flooding
-
Submitted to John Wiley & Sons, July
-
M. Bellaïche and J.-C. Grégoire, "Monitoring TCP handshakes on DDoS flooding," in Submitted to Security and Communications Networks, John Wiley & Sons, July 2009.
-
(2009)
Security and Communications Networks
-
-
Bellaïche, M.1
Grégoire, J.-C.2
-
14
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
IEEE Computer Society, April
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to DDoS attack detection and response," in Proceedings in DARPA Information Survivability Conference and Exposition. IEEE Computer Society, April 2003.
-
(2003)
Proceedings in DARPA Information Survivability Conference and Exposition
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
16
-
-
77951525581
-
-
"UCLA packet traces," http://lever.cs.ucla.edu/ddos/traces/.
-
UCLA Packet Traces
-
-
|