메뉴 건너뛰기




Volumn 4, Issue 9, 2009, Pages 921-928

A novel distributed detection scheme against DDoS attack

Author keywords

CUSUM algorithm; DDoS attack; Distributed detection; P2P; Similarity

Indexed keywords

ABNORMALITY DETECTION; CHORD PROTOCOL; COMMUNICATION PROBLEMS; CUSUM ALGORITHMS; DDOS ATTACK; DETECTION ACCURACY; DETECTION ALGORITHM; DETECTION RATES; DETECTION SCHEME; DISTRIBUTED APPLICATION SYSTEMS; DISTRIBUTED DETECTION; EARLY DETECTION; FALSE POSITIVE RATES; IP ADDRESSS; MALICIOUS NODES; P2P NETWORK; P2P-BASED; SIMILARITY ALGORITHM;

EID: 78651538896     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.4.9.921-928     Document Type: Article
Times cited : (11)

References (21)
  • 2
    • 51149105210 scopus 로고    scopus 로고
    • Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study
    • Seattle, Washington, May
    • J.B.D. Cabrera, L. Lewis, X.Z. Qin et al. "Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study," In: proceedings of IEEE/IFIP International Integrated Network Management Symposium. Seattle, Washington, May 2001, pp: 609-622.
    • (2001) Proceedings of IEEE/IFIP International Integrated Network Management Symposium , pp. 609-622
    • Cabrera, J.B.D.1    Lewis, L.2    Qin, X.Z.3
  • 5
    • 4143081502 scopus 로고    scopus 로고
    • A Covariance Analysis Model for DDoS Attack Detection
    • (ICC2004), June
    • S. Y. Jin, and D. S. Yeung, "A Covariance Analysis Model for DDoS Attack Detection," IEEE International Conference on Communications (ICC2004), June, 2004, pp: 1882-1886
    • (2004) IEEE International Conference on Communications , pp. 1882-1886
    • Jin, S.Y.1    Yeung, D.S.2
  • 8
    • 27544465087 scopus 로고    scopus 로고
    • Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics
    • ISCC 2005, 27-30, June 2005
    • C. Siaterlis and V. Maglaris, "Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics," Proceedings. 10th IEEE Symposium on Computers and Communications, 2005. ISCC 2005, 27-30, June 2005, pp: 469-475.
    • (2005) Proceedings. 10th IEEE Symposium on Computers and Communications , pp. 469-475
    • Siaterlis, C.1    Maglaris, V.2
  • 10
    • 42549129280 scopus 로고    scopus 로고
    • A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks
    • Istanbul, Turkey
    • H. Y. Lam, C. P. Li, S. T. Chanson, et al. "A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks," In: Proceedings of IEEE International Conference on Communications. Istanbul, Turkey, 2006, pp: 2165-2170.
    • (2006) Proceedings of IEEE International Conference on Communications , pp. 2165-2170
    • Lam, H.Y.1    Li, C.P.2    Chanson, S.T.3
  • 12
    • 3543107873 scopus 로고    scopus 로고
    • Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks
    • G. Koutepas, F. Stamatelopoulos, B. Maglaris. "Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks," Journal of Network and Systems Management, 2004, 12(1): 73-94.
    • (2004) Journal of Network and Systems Management , vol.12 , Issue.1 , pp. 73-94
    • Koutepas, G.1    Stamatelopoulos, F.2    Maglaris, B.3
  • 15
    • 8744295684 scopus 로고    scopus 로고
    • Distributed Change Detection for Worms, DDoS and Other Network Attacks
    • Boston, Massachusetts, USA
    • A. A. Cardenas, J. S. Baras, V. Ramezani. "Distributed Change Detection for Worms, DDoS and Other Network Attacks," In: Proceedings of the American Control Conference. Boston, Massachusetts, USA, 2004, pp: 1008-1013.
    • (2004) Proceedings of the American Control Conference , pp. 1008-1013
    • Cardenas, A.A.1    Baras, J.S.2    Ramezani, V.3
  • 16
    • 78651593907 scopus 로고    scopus 로고
    • A Novel Approach to Detection of Denial-of-Service Attacks Via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
    • Pittsburgh, Pennsylvania, USA
    • R. B. Blazek, H. Kim, B. Rozovskii, et al. "A Novel Approach to Detection of Denial-of-Service Attacks Via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection. Pittsburgh, Pennsylvania, USA, 2006, pp: 3372-3382.
    • (2006) Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection , pp. 3372-3382
    • Blazek, R.B.1    Kim, H.2    Rozovskii, B.3
  • 20
    • 33644935055 scopus 로고    scopus 로고
    • Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithm
    • Z. X. Sun, Y. W. Tang, Y. Cheng. "Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithm," Journal of Software, 2005, 16(12): 2117-2123.
    • (2005) Journal of Software , vol.16 , Issue.12 , pp. 2117-2123
    • Sun, Z.X.1    Tang, Y.W.2    Cheng, Y.3
  • 21
    • 33748920350 scopus 로고    scopus 로고
    • An Improvement on Precision in D-WARD Detection System with CUSUM Algorithm
    • J. Kang, Z. Zhang, J. B. Ju. "An Improvement on Precision in D-WARD Detection System with CUSUM Algorithm," Chinese Journal of Scientific Instrument, 2006, 27(5): 456-460.
    • (2006) Chinese Journal of Scientific Instrument , vol.27 , Issue.5 , pp. 456-460
    • Kang, J.1    Zhang, Z.2    Ju, J.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.