메뉴 건너뛰기




Volumn 4, Issue 3, 2010, Pages 428-451

Combining adaptive filtering and IF flows to detect DDOS attacks within a router

Author keywords

Anomaly detection; Distributed denial of service; Kalman filter; Recursive least square; Router wide traffic analysis

Indexed keywords


EID: 77954255664     PISSN: None     EISSN: 19767277     Source Type: Journal    
DOI: 10.3837/tiis.2010.06.014     Document Type: Article
Times cited : (7)

References (32)
  • 1
    • 0021426851 scopus 로고
    • A note on denial-of-service in operating systems
    • V. D. Gligor, A note on denial-of-service in operating systems," IEEE Trans. Softw. Eng., vol. 10, no. 3, pp. 320-324, 1984.
    • (1984) IEEE Trans. Softw. Eng , vol.10 , Issue.3 , pp. 320-324
    • Gligor, V.D.1
  • 2
    • 77954279874 scopus 로고    scopus 로고
    • Computer Crime Research Center, 2004 CSI/FBI Computer Crime and Security Survey,
    • Computer Crime Research Center, 2004 CSI/FBI Computer Crime and Security Survey, http://www.crime-research.org/news/11.06.2004/423/
  • 4
    • 38149128386 scopus 로고    scopus 로고
    • Detecting Traffic Anomalies at the Source through Aggregate Analysis of Packet Header Data
    • in
    • S. Kim, A. Reddy, and M. Vannucci, "Detecting Traffic Anomalies at the Source through Aggregate Analysis of Packet Header Data," in Proc. of Networking, 2004.
    • (2004) Proc. of Networking
    • Kim, S.1    Reddy, A.2    Vannucci, M.3
  • 5
    • 50249125390 scopus 로고    scopus 로고
    • Dynamic Features Measurement and Analysis for Large-Scale Networks
    • in
    • Tao Qin, Xiaohong Guan, Wei Li, and Pinghui Wang, "Dynamic Features Measurement and Analysis for Large-Scale Networks," in Proc. of ICC2008, CSIM workshop, pp. 212-216, 2008.
    • (2008) Proc. of ICC2008, CSIM Workshop , pp. 212-216
    • Qin, T.1    Guan, X.2    Li, W.3    Wang, P.4
  • 13
    • 33646878980 scopus 로고    scopus 로고
    • Detecting distributed denial-of-service attacks using kolmogorov complexity metrics
    • Amit Kulkarni and Stephen Bush, "Detecting distributed denial-of-service attacks using kolmogorov complexity metrics," Journal of Network and Systems Management, vol. 14, no. 1, pp. 69-80, Mar. 2006.
    • (2006) Journal of Network and Systems Management , vol.14 , Issue.1 , pp. 69-80
    • Kulkarni, A.1    Bush, S.2
  • 14
    • 0038729330 scopus 로고    scopus 로고
    • Protection from distributed denial of service attacks using history-based IP filtering
    • in
    • Peng Tao, C. Leckie and K. Ramamohanarao, "Protection from distributed denial of service attacks using history-based IP filtering," in Proc. of ICC'03, pp. 482-486, 2003.
    • (2003) Proc. of ICC'03 , pp. 482-486
    • Tao, P.1    Leckie, C.2    Ramamohanarao, K.3
  • 15
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative Detection of DDoS Attacks over Multiple Network Domains
    • Yu Chen, Kai Hwang, Wei-Shinn Ku, "Collaborative Detection of DDoS Attacks over Multiple Network Domains," IEEE Trans. On Parallel and Distributed Systmes, vol. 18, no. 12, pp. 1649-1662, Dec. 2007.
    • (2007) IEEE Trans. On Parallel and Distributed Systmes , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Wei-Shinn, K.3
  • 16
    • 33644935055 scopus 로고    scopus 로고
    • Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithms
    • Sun Zhi-Xin, Tang Yi-Wei, Cheng Yuan, "Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithms," Journal of Software, vol. 16, no. 12, pp. 2117-2123, 2005.
    • (2005) Journal of Software , vol.16 , Issue.12 , pp. 2117-2123
    • Zhi-Xin, S.1    Yi-Wei, T.2    Yuan, C.3
  • 17
    • 70349664554 scopus 로고    scopus 로고
    • Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS attack
    • Ruoyu Yan and Qinghua Zheng, "Using Renyi Cross Entropy to Analyze Traffic Matrix and Detect DDoS attack", Information Technology Journal, vol. 8, no. 8, pp. 1180-1188, 2009.
    • (2009) Information Technology Journal , vol.8 , Issue.8 , pp. 1180-1188
    • Yan, R.1    Zheng, Q.2
  • 19
    • 15544363902 scopus 로고    scopus 로고
    • Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles
    • David K. Y. Yau, John C. S. Lui, Feng Liang, and Yeung Yam, "Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles," IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 13, no. 1, pp. 29-42, Feb. 2005.
    • (2005) IEEE/ACM TRANSACTIONS ON NETWORKING , vol.13 , Issue.1 , pp. 29-42
    • David, K.Y.1    John, Y.2    Lui, C.S.3    Liang, F.4    Yam, Y.5
  • 21
    • 77954267370 scopus 로고    scopus 로고
    • Cisco IOS NetFlow White Papers
    • Cisco IOS NetFlow White Papers, http://www.cisco.com/en/US/products/ps6601/prod_white_papers_list.html.
  • 22
    • 77954276630 scopus 로고    scopus 로고
    • Cisco NetFlow Performance Analysis White Papers, 2007
    • Cisco NetFlow Performance Analysis White Papers, http://www.cisco.com/en/US/technologies/tk543/tk812/technologies_white_paper0900aecd802a0eb9_ps6601_Products_White_Paper.html,2007.
  • 24
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-time
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-time," Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 25
    • 77952630450 scopus 로고    scopus 로고
    • The EM algorithm for Multivariable Dynamic System Estimation
    • Brett Ninness, Stuart Gibson, "The EM algorithm for Multivariable Dynamic System Estimation," Technical Report EE200101, 2001.
    • (2001) Technical Report EE200101
    • Ninness, B.1    Gibson, S.2
  • 27
    • 0027681974 scopus 로고
    • ML Estimation of a Stochastic Linear System with the EM Algorithm and Its Application to Speech Recognition
    • V. Digalakis, J. Rohlicek, M. Ostendorf, "ML Estimation of a Stochastic Linear System with the EM Algorithm and Its Application to Speech Recognition," IEEE Trans. On Speech and Audio Processing, vol. 1, no. 4, pp. 431-441, 1993.
    • (1993) IEEE Trans. On Speech and Audio Processing , vol.1 , Issue.4 , pp. 431-441
    • Digalakis, V.1    Rohlicek, J.2    Ostendorf, M.3
  • 28
    • 1642519908 scopus 로고    scopus 로고
    • The changepoint model for statistical process control
    • Douglas M. Hawkins, Peihua Qiu, Chang Wook Kang, "The changepoint model for statistical process control," Journal of Quality Technology, vol. 35, no. 4, pp. 355-366, 2003.
    • (2003) Journal of Quality Technology , vol.35 , Issue.4 , pp. 355-366
    • Hawkins Douglas, M.1    Qiu, P.2    Kang, C.W.3
  • 30
    • 33244460594 scopus 로고    scopus 로고
    • Why Is the Internet Traffic Bursty in Short Time Scales
    • Hao Jiang, Constantinos Dovrolis, "Why Is the Internet Traffic Bursty in Short Time Scales," in Proc. of ACM SIG METRICS'05, pp. 241-252, June 2005.
    • (2005) In Proc. of ACM SIG METRICS'05 , pp. 241-252
    • Jiang, H.1    Dovrolis, C.2
  • 32
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • in, Philadelphia, Pennsylvania, USA
    • Anukool Lakhina, Mark Crovella, Christophe Diot, "Mining anomalies using traffic feature distributions," in Proc. of SIGCOMM'05, Philadelphia, Pennsylvania, USA, pp. 217-228, 2005.
    • (2005) Proc. of SIGCOMM'05 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.