메뉴 건너뛰기




Volumn 21, Issue 8, 2010, Pages 1203-1216

Detecting application denial-of-service attacks: A group-testing-based approach

Author keywords

Application DoS; group testing; network security

Indexed keywords

APPLICATION SERVICES; BACK-END SERVERS; CLIENT SERVICES; DDOS ATTACK; DENIAL OF SERVICE ATTACKS; DETECTION ALGORITHM; DOS ATTACKS; DYNAMIC THRESHOLD; GENERAL NETWORKS; GROUP TESTING; MODE DETECTION; NETWORK RESOURCE; NETWORK SERVICES; PERFORMANCE ENHANCEMENTS; SIMULATION RESULT; SIZE CONSTRAINT; THEORETICAL COMPLEXITY; VIRTUAL SERVERS;

EID: 77954302312     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2009.147     Document Type: Article
Times cited : (60)

References (27)
  • 1
    • 33845591142 scopus 로고    scopus 로고
    • DDos- Resilient scheduling to counter application layer attacks under imperfect detection
    • Apr.
    • S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDos- Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection," Proc. IEEE INFOCOM, Apr. 2006.
    • (2006) Proc. IEEE INFOCOM
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 7
    • 1642283261 scopus 로고    scopus 로고
    • A taxonomy of DDoS attacks and DDoS defense mechanisms
    • Computer Science Dept., UCLA
    • J. Mirkovic, J. Martin, and P. Reiher, "A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms," Technical Report 020018, Computer Science Dept., UCLA, 2002.
    • (2002) Technical Report 020018\
    • Mirkovic, J.1    Martin, J.2    Reiher, P.3
  • 9
    • 3042859154 scopus 로고    scopus 로고
    • Resisting SYN flood DoS attacks with a SYN cache
    • J. Lemon, "Resisting SYN Flood DoS Attacks with a SYN Cache," Proc. BSDCON, 2002.
    • (2002) Proc. BSDCON
    • Lemon, J.1
  • 11
    • 8344261545 scopus 로고    scopus 로고
    • Packetscore: Statisticsbased overload control against distributed denial-of- service attacks
    • Y. Kim, W.C. Lau, M.C. Chuah, and H.J. Chao, "Packetscore: Statisticsbased Overload Control against Distributed Denial-of- Service Attacks," Proc. IEEE INFOCOM, 2004.
    • (2004) Proc. IEEE INFOCOM
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 18
    • 33947284998 scopus 로고    scopus 로고
    • Mean response time for a G/G/1 queueing system: Simulated computation
    • Mar.
    • Y. Chu and J. Ke, "Mean Response Time for a G/G/1 Queueing System: Simulated Computation," Applied Math. and Computation, vol.186, no.1, pp. 772-779, Mar. 2007.
    • (2007) Applied Math. and Computation , vol.186 , Issue.1 , pp. 772-779
    • Chu, Y.1    Ke, J.2
  • 21
    • 3543119176 scopus 로고    scopus 로고
    • Guaranteeing access in spite of distributed service- flooding attacks
    • V.D. Gligor, "Guaranteeing Access in spite of Distributed Service- Flooding Attacks," Proc. Security Protocols Workshop, 2003.
    • (2003) Proc. Security Protocols Workshop
    • Gligor, V.D.1
  • 22
    • 0034279480 scopus 로고    scopus 로고
    • How to fit a response time distribution
    • T.V. Zandt, "How to Fit a Response Time Distribution," Psychonomic Bull. and Rev., vol.7, no.3, 2000.
    • (2000) Psychonomic Bull. and Rev. , vol.7 , Issue.3
    • Zandt, T.V.1
  • 26
    • 85034043506 scopus 로고    scopus 로고
    • Protecting web servers from distributed denial of service attacks
    • F. Kargl, J. Maier, and M. Weber, "Protecting Web Servers from Distributed Denial of Service Attacks," Proc. World Wide Web Conf., pp. 514-524, 2001.
    • (2001) Proc. World Wide Web Conf. , pp. 514-524
    • Kargl, F.1    Maier, J.2    Weber, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.