-
1
-
-
0021426851
-
A note on denial-of-service in operating systems
-
V. D. Gligor, A note on denial-of-service in operating systems," IEEE Trans. Softw. Eng., vol. 10, no. 3, pp. 320-324, 1984.
-
(1984)
IEEE Trans. Softw. Eng
, vol.10
, Issue.3
, pp. 320-324
-
-
Gligor, V.D.1
-
2
-
-
77954279874
-
-
Computer Crime Research Center, 2004 CSI/FBI Computer Crime and Security Survey,
-
Computer Crime Research Center, 2004 CSI/FBI Computer Crime and Security Survey, http://www.crime-research.org/news/11.06.2004/423/
-
-
-
-
3
-
-
0141427794
-
A Signal Analysis of Network Traffic Anomalies," in
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A Signal Analysis of Network Traffic Anomalies," in Proc. of Internet Measurement Workshop, 2002.
-
(2002)
Proc. of Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
4
-
-
38149128386
-
Detecting Traffic Anomalies at the Source through Aggregate Analysis of Packet Header Data
-
in
-
S. Kim, A. Reddy, and M. Vannucci, "Detecting Traffic Anomalies at the Source through Aggregate Analysis of Packet Header Data," in Proc. of Networking, 2004.
-
(2004)
Proc. of Networking
-
-
Kim, S.1
Reddy, A.2
Vannucci, M.3
-
5
-
-
50249125390
-
Dynamic Features Measurement and Analysis for Large-Scale Networks
-
in
-
Tao Qin, Xiaohong Guan, Wei Li, and Pinghui Wang, "Dynamic Features Measurement and Analysis for Large-Scale Networks," in Proc. of ICC2008, CSIM workshop, pp. 212-216, 2008.
-
(2008)
Proc. of ICC2008, CSIM Workshop
, pp. 212-216
-
-
Qin, T.1
Guan, X.2
Li, W.3
Wang, P.4
-
7
-
-
36349029177
-
Sensitivity of PCA for Traffic Anomaly Detection
-
in
-
Haakon Ringberg, Augustin Soule, Jennifer Rexford, Christophe Diot, "Sensitivity of PCA for Traffic Anomaly Detection," in Proc. of SIGMETRICS'07,USA, pp. 109-120, June 2007.
-
(2007)
Proc. of SIGMETRICS'07,USA
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
8
-
-
21844451952
-
Diagnosing Network-wide Traffic Anomalies
-
in
-
Anukool Lakhina, Mark Crovella, Christophe Diot, "Diagnosing Network-wide Traffic Anomalies," in Proc. of SIGCOMM'04, Portland, Oregon,USA, pp. 219-230, 2004.
-
(2004)
Proc. of SIGCOMM'04, Portland, Oregon,USA
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
84878737375
-
Combining Filtering and Statistical Methods for Anomaly Detection
-
in
-
Augustin Soule, Kave Salamatian, Nina Taft, "Combining Filtering and Statistical Methods for Anomaly Detection," in Proc. of Internet Measurement Conference, pp. 331-344, 2005.
-
(2005)
Proc. of Internet Measurement Conference
, pp. 331-344
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
10
-
-
0036427309
-
A Taxonomy of IP Traffic Matrices
-
in
-
A. Medina, C. Fraleigh, N. Taft, S. Bhattacharyya, C. Diot, "A Taxonomy of IP Traffic Matrices", in Proc. of Scalability and Traffic Control in IP Networks II, Boston, USA, pp. 200-213, 2003.
-
(2003)
Proc. of Scalability and Traffic Control In IP Networks II, Boston, USA
, pp. 200-213
-
-
Medina, A.1
Fraleigh, C.2
Taft, N.3
Bhattacharyya, S.4
Diot, C.5
-
13
-
-
33646878980
-
Detecting distributed denial-of-service attacks using kolmogorov complexity metrics
-
Amit Kulkarni and Stephen Bush, "Detecting distributed denial-of-service attacks using kolmogorov complexity metrics," Journal of Network and Systems Management, vol. 14, no. 1, pp. 69-80, Mar. 2006.
-
(2006)
Journal of Network and Systems Management
, vol.14
, Issue.1
, pp. 69-80
-
-
Kulkarni, A.1
Bush, S.2
-
14
-
-
0038729330
-
Protection from distributed denial of service attacks using history-based IP filtering
-
in
-
Peng Tao, C. Leckie and K. Ramamohanarao, "Protection from distributed denial of service attacks using history-based IP filtering," in Proc. of ICC'03, pp. 482-486, 2003.
-
(2003)
Proc. of ICC'03
, pp. 482-486
-
-
Tao, P.1
Leckie, C.2
Ramamohanarao, K.3
-
15
-
-
36348929372
-
Collaborative Detection of DDoS Attacks over Multiple Network Domains
-
Yu Chen, Kai Hwang, Wei-Shinn Ku, "Collaborative Detection of DDoS Attacks over Multiple Network Domains," IEEE Trans. On Parallel and Distributed Systmes, vol. 18, no. 12, pp. 1649-1662, Dec. 2007.
-
(2007)
IEEE Trans. On Parallel and Distributed Systmes
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Wei-Shinn, K.3
-
16
-
-
33644935055
-
Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithms
-
Sun Zhi-Xin, Tang Yi-Wei, Cheng Yuan, "Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithms," Journal of Software, vol. 16, no. 12, pp. 2117-2123, 2005.
-
(2005)
Journal of Software
, vol.16
, Issue.12
, pp. 2117-2123
-
-
Zhi-Xin, S.1
Yi-Wei, T.2
Yuan, C.3
-
17
-
-
70349664554
-
Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS attack
-
Ruoyu Yan and Qinghua Zheng, "Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS attack", Information Technology Journal, vol. 8, no. 8, pp. 1180-1188, 2009.
-
(2009)
Information Technology Journal
, vol.8
, Issue.8
, pp. 1180-1188
-
-
Yan, R.1
Zheng, Q.2
-
18
-
-
34548183355
-
A Distributed Approach using Entropy to Detect DDoS attacks in ISP Domain
-
in
-
Krishan Kumar, R.C Joshi, Kuldip Singh, "A Distributed Approach using Entropy to Detect DDoS attacks in ISP Domain," in Proc. of International Conference on Signal Processing, Communications and Networking, pp. 331-337, 2007.
-
(2007)
Proc. of International Conference On Signal Processing, Communications and Networking
, pp. 331-337
-
-
Kumar, K.1
Joshi, R.C.2
Singh, K.3
-
19
-
-
15544363902
-
Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles
-
David K. Y. Yau, John C. S. Lui, Feng Liang, and Yeung Yam, "Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles," IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 13, no. 1, pp. 29-42, Feb. 2005.
-
(2005)
IEEE/ACM TRANSACTIONS ON NETWORKING
, vol.13
, Issue.1
, pp. 29-42
-
-
David, K.Y.1
John, Y.2
Lui, C.S.3
Liang, F.4
Yam, Y.5
-
20
-
-
8344255864
-
Structural Analysis of Network Traffic Flows
-
in
-
Anukool Lakhina, Konstantina Papagiannaki, Mark Crovella, Christophe Diot, Eric D.Kolaczyk, and Nina Taft, "Structural Analysis of Network Traffic Flows," in Proc. Of SIGMETRICS/Performance, New York, USA, pp. 61-72, 2004.
-
(2004)
Proc. of SIGMETRICS/Performance, New York, USA
, pp. 61-72
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.D.5
Taft, N.6
-
21
-
-
77954267370
-
-
Cisco IOS NetFlow White Papers
-
Cisco IOS NetFlow White Papers, http://www.cisco.com/en/US/products/ps6601/prod_white_papers_list.html.
-
-
-
-
22
-
-
77954276630
-
-
Cisco NetFlow Performance Analysis White Papers, 2007
-
Cisco NetFlow Performance Analysis White Papers, http://www.cisco.com/en/US/technologies/tk543/tk812/technologies_white_paper0900aecd802a0eb9_ps6601_Products_White_Paper.html,2007.
-
-
-
-
24
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-time," Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
25
-
-
77952630450
-
The EM algorithm for Multivariable Dynamic System Estimation
-
Brett Ninness, Stuart Gibson, "The EM algorithm for Multivariable Dynamic System Estimation," Technical Report EE200101, 2001.
-
(2001)
Technical Report EE200101
-
-
Ninness, B.1
Gibson, S.2
-
26
-
-
84950419507
-
Dynamic Linear Models with Switching
-
R. H. Shmway, D. S. Stoffer, "Dynamic Linear Models with Switching," Journal of the American Statistical Association, vol. 86, no. 415, pp. 763-769, 1991.
-
(1991)
Journal of The American Statistical Association
, vol.86
, Issue.415
, pp. 763-769
-
-
Shmway, R.H.1
Stoffer, D.S.2
-
27
-
-
0027681974
-
ML Estimation of a Stochastic Linear System with the EM Algorithm and Its Application to Speech Recognition
-
V. Digalakis, J. Rohlicek, M. Ostendorf, "ML Estimation of a Stochastic Linear System with the EM Algorithm and Its Application to Speech Recognition," IEEE Trans. On Speech and Audio Processing, vol. 1, no. 4, pp. 431-441, 1993.
-
(1993)
IEEE Trans. On Speech and Audio Processing
, vol.1
, Issue.4
, pp. 431-441
-
-
Digalakis, V.1
Rohlicek, J.2
Ostendorf, M.3
-
28
-
-
1642519908
-
The changepoint model for statistical process control
-
Douglas M. Hawkins, Peihua Qiu, Chang Wook Kang, "The changepoint model for statistical process control," Journal of Quality Technology, vol. 35, no. 4, pp. 355-366, 2003.
-
(2003)
Journal of Quality Technology
, vol.35
, Issue.4
, pp. 355-366
-
-
Hawkins Douglas, M.1
Qiu, P.2
Kang, C.W.3
-
29
-
-
85084161486
-
Inferring internet Denial-of-Service activity
-
in
-
D. Moore, G. M. Voelker, S. Savage, "Inferring internet Denial-of-Service activity," in Proc. of the 10th USENIX Security Symposium, pp. 9-22, 2001.
-
(2001)
Proc. of The 10th USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
30
-
-
33244460594
-
Why Is the Internet Traffic Bursty in Short Time Scales
-
Hao Jiang, Constantinos Dovrolis, "Why Is the Internet Traffic Bursty in Short Time Scales," in Proc. of ACM SIG METRICS'05, pp. 241-252, June 2005.
-
(2005)
In Proc. of ACM SIG METRICS'05
, pp. 241-252
-
-
Jiang, H.1
Dovrolis, C.2
-
31
-
-
77953077374
-
Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites
-
in
-
J. Jung, B. Krishnamurthy and M. Rabinovich. "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites," in Proc. of World Wide Web Conference, Hawaii, USA, 2002.
-
(2002)
Proc. of World Wide Web Conference, Hawaii, USA
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
32
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
in, Philadelphia, Pennsylvania, USA
-
Anukool Lakhina, Mark Crovella, Christophe Diot, "Mining anomalies using traffic feature distributions," in Proc. of SIGCOMM'05, Philadelphia, Pennsylvania, USA, pp. 217-228, 2005.
-
(2005)
Proc. of SIGCOMM'05
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
|