-
1
-
-
35248864519
-
Efficient Broadcast in Structured Peer-to-Peer Networks
-
Springer-Verlag, London
-
S. Elansary, L. O. Alima, P. Brand, et al. "Efficient Broadcast in Structured Peer-to-Peer Networks," In: Proceedings of International Workshop on Peer-to-Peer Systems. Springer-Verlag, London, 2003, pp: 304-314.
-
(2003)
Proceedings of International Workshop on Peer-to-Peer Systems
, pp. 304-314
-
-
Elansary, S.1
Alima, L.O.2
Brand, P.3
-
2
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study
-
Seattle, Washington, May
-
J.B.D. Cabrera, L. Lewis, X.Z. Qin et al. "Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study," In: proceedings of IEEE/IFIP International Integrated Network Management Symposium. Seattle, Washington, May 2001, pp: 609-622.
-
(2001)
Proceedings of IEEE/IFIP International Integrated Network Management Symposium
, pp. 609-622
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.Z.3
-
3
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
Washington, DC, April
-
L. Feinstein, D. Schnackenberg, R. Balupari et al. "Statistical approaches to DDoS attack detection and response," In: Proceedings of DARPA Information Survivability Conference and Exposition. Washington, DC, April 2003, pp: 303-314.
-
(2003)
Proceedings of DARPA Information Survivability Conference and Exposition
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
-
4
-
-
84942417880
-
COSSACK: Coordinated Suppression of Simultaneous Attacks
-
Washington, DC, April
-
C. Papadopoulos, R. Lindell, J. Mehringer et al. "COSSACK: Coordinated Suppression of Simultaneous Attacks," In: proceedings of DARPA Information Survivability Conference and Exposition. Washington, DC, April 2003, pp: 94-96.
-
(2003)
Proceedings of DARPA Information Survivability Conference and Exposition
, pp. 94-96
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
-
5
-
-
4143081502
-
A Covariance Analysis Model for DDoS Attack Detection
-
(ICC2004), June
-
S. Y. Jin, and D. S. Yeung, "A Covariance Analysis Model for DDoS Attack Detection," IEEE International Conference on Communications (ICC2004), June, 2004, pp: 1882-1886
-
(2004)
IEEE International Conference on Communications
, pp. 1882-1886
-
-
Jin, S.Y.1
Yeung, D.S.2
-
7
-
-
33746798964
-
An unsupervised approach for detecting DDoS attacks based on traffic based metrics
-
Victoria, BC, August
-
W. Lu, I. Traore, An unsupervised approach for detecting DDoS attacks based on traffic based metrics, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, BC, August 2005, pp: 462-465,
-
(2005)
IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
, pp. 462-465
-
-
Lu, W.1
Traore, I.2
-
8
-
-
27544465087
-
Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics
-
ISCC 2005, 27-30, June 2005
-
C. Siaterlis and V. Maglaris, "Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics," Proceedings. 10th IEEE Symposium on Computers and Communications, 2005. ISCC 2005, 27-30, June 2005, pp: 469-475.
-
(2005)
Proceedings. 10th IEEE Symposium on Computers and Communications
, pp. 469-475
-
-
Siaterlis, C.1
Maglaris, V.2
-
9
-
-
17644427757
-
Alliance Formation for DDoS Defense
-
ACM SIGSAC, San Francisco, CA, USA
-
J. Mirkovic, M. Robinson, P. Reiher, et al. "Alliance Formation for DDoS Defense," In: Proceedings of the New Security Paradigms Workshop. ACM SIGSAC, San Francisco, CA, USA, 2003, pp: 11-18.
-
(2003)
Proceedings of the New Security Paradigms Workshop
, pp. 11-18
-
-
Mirkovic, J.1
Robinson, M.2
Reiher, P.3
-
10
-
-
42549129280
-
A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks
-
Istanbul, Turkey
-
H. Y. Lam, C. P. Li, S. T. Chanson, et al. "A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks," In: Proceedings of IEEE International Conference on Communications. Istanbul, Turkey, 2006, pp: 2165-2170.
-
(2006)
Proceedings of IEEE International Conference on Communications
, pp. 2165-2170
-
-
Lam, H.Y.1
Li, C.P.2
Chanson, S.T.3
-
11
-
-
33744910842
-
A novel approach to detecting DDoS Attacks at an Early Stage
-
B. Xiao, W. Chen, Y. X. He. "A novel approach to detecting DDoS Attacks at an Early Stage," The Journal of Supercomputing, Springer Netherlands, 2006, 36(3): 235-248.
-
(2006)
The Journal of Supercomputing, Springer Netherlands
, vol.36
, Issue.3
, pp. 235-248
-
-
Xiao, B.1
Chen, W.2
He, Y.X.3
-
12
-
-
3543107873
-
Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks
-
G. Koutepas, F. Stamatelopoulos, B. Maglaris. "Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks," Journal of Network and Systems Management, 2004, 12(1): 73-94.
-
(2004)
Journal of Network and Systems Management
, vol.12
, Issue.1
, pp. 73-94
-
-
Koutepas, G.1
Stamatelopoulos, F.2
Maglaris, B.3
-
13
-
-
33845584261
-
Collaborative Change Detection of DDoS Attacks on Community and ISP Networks
-
Las Vegas, NV, USA
-
Y. Chen, K. Hwang. "Collaborative Change Detection of DDoS Attacks on Community and ISP Networks," In: Proceedings of International Symposium on Collaborative Technologies and Systems. Las Vegas, NV, USA, 2006, pp: 401-410.
-
(2006)
Proceedings of International Symposium on Collaborative Technologies and Systems
, pp. 401-410
-
-
Chen, Y.1
Hwang, K.2
-
14
-
-
36348929372
-
Collaborative Detection of DDoS Attacks over Multiple Network Domains
-
Y. Chen, K. Hwang, W. S. Ku. Collaborative Detection of DDoS Attacks over Multiple Network Domains. In: Proceedings of the IEEE Transactions on Parallel and Distributed Systems, 2007, 18(12): 1649-1662.
-
(2007)
Proceedings of the IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.S.3
-
15
-
-
8744295684
-
Distributed Change Detection for Worms, DDoS and Other Network Attacks
-
Boston, Massachusetts, USA
-
A. A. Cardenas, J. S. Baras, V. Ramezani. "Distributed Change Detection for Worms, DDoS and Other Network Attacks," In: Proceedings of the American Control Conference. Boston, Massachusetts, USA, 2004, pp: 1008-1013.
-
(2004)
Proceedings of the American Control Conference
, pp. 1008-1013
-
-
Cardenas, A.A.1
Baras, J.S.2
Ramezani, V.3
-
16
-
-
78651593907
-
A Novel Approach to Detection of Denial-of-Service Attacks Via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
-
Pittsburgh, Pennsylvania, USA
-
R. B. Blazek, H. Kim, B. Rozovskii, et al. "A Novel Approach to Detection of Denial-of-Service Attacks Via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection. Pittsburgh, Pennsylvania, USA, 2006, pp: 3372-3382.
-
(2006)
Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection
, pp. 3372-3382
-
-
Blazek, R.B.1
Kim, H.2
Rozovskii, B.3
-
17
-
-
0036343692
-
Detecting SYN Flooding Attacks
-
New York, USA
-
H. N. Wang, D. L. Zhang, K. G. Shin. "Detecting SYN Flooding Attacks," In: Proceedings of the 21st Annual Joint Conf. of the IEEE Computer and Communications Societies. New York, USA, 2002, pp: 1530-1539.
-
(2002)
Proceedings of the 21st Annual Joint Conf. of the IEEE Computer and Communications Societies
, pp. 1530-1539
-
-
Wang, H.N.1
Zhang, D.L.2
Shin, K.G.3
-
18
-
-
14644397228
-
Change-Point Monitoring for the Detection of DoS Attacks
-
H. N. Wang, D. L. Zhang, K. G. Shin. "Change-Point Monitoring for the Detection of DoS Attacks," IEEE Trans. Dependable and Secure Computing, 2004, 1(4): 193-208.
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.N.1
Zhang, D.L.2
Shin, K.G.3
-
19
-
-
38049152816
-
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs
-
Wollongong, Australia
-
T. Peng, C. Leckie, K. Ramamohanarao. "Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs," In: Proceedings of the Eighth Australasian Conf. Information Security and Privacy. Wollongong, Australia, 2003, pp: 214-225.
-
(2003)
Proceedings of the Eighth Australasian Conf. Information Security and Privacy
, pp. 214-225
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
20
-
-
33644935055
-
Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithm
-
Z. X. Sun, Y. W. Tang, Y. Cheng. "Router Anomaly Traffic Detection Based on Modified-CUSUM Algorithm," Journal of Software, 2005, 16(12): 2117-2123.
-
(2005)
Journal of Software
, vol.16
, Issue.12
, pp. 2117-2123
-
-
Sun, Z.X.1
Tang, Y.W.2
Cheng, Y.3
-
21
-
-
33748920350
-
An Improvement on Precision in D-WARD Detection System with CUSUM Algorithm
-
J. Kang, Z. Zhang, J. B. Ju. "An Improvement on Precision in D-WARD Detection System with CUSUM Algorithm," Chinese Journal of Scientific Instrument, 2006, 27(5): 456-460.
-
(2006)
Chinese Journal of Scientific Instrument
, vol.27
, Issue.5
, pp. 456-460
-
-
Kang, J.1
Zhang, Z.2
Ju, J.B.3
|