-
1
-
-
0030715989
-
Analysis of a denial of service attack on tcp
-
May
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on tcp," In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 208-223, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
2
-
-
11244259034
-
A wavelet-based framework for proactive detection of network misconfigurations
-
Sep.
-
A. Magnaghi, T. Hamada, and T. Katsuyama, "A wavelet-based framework for proactive detection of network misconfigurations," IEEE/ACM Proceedings of the ACM SIGCOMM workshop on Network, no. 3, pp. 253-258, Sep. 2004.
-
(2004)
IEEE/ACM Proceedings of the ACM SIGCOMM Workshop on Network
, Issue.3
, pp. 253-258
-
-
Magnaghi, A.1
Hamada, T.2
Katsuyama, T.3
-
3
-
-
84942256107
-
Statistical approaches to ddos attack detection and response
-
Apr.
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to ddos attack detection and response," Proceedings of DARPA Information Survivability Conference and Exposition, vol. 1, pp. 303-314, Apr. 2003.
-
(2003)
Proceedings of DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
4
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
Sep.
-
G. Carl, G. Kesidis, R. R. Brooks, and S. Rai, "Denial-of-service attack-detection techniques," IEEE Internet Computing, vol. 10, no. 6, pp. 82-89, Sep. 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.6
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
5
-
-
37349125374
-
Ddos attack detection method using cluster analysis
-
Apr.
-
K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim, "Ddos attack detection method using cluster analysis," Expert Systems with Applications, vol. 34, pp. 1659-1665, Apr. 2008.
-
(2008)
Expert Systems with Applications
, vol.34
, pp. 1659-1665
-
-
Lee, K.1
Kim, J.2
Kwon, K.H.3
Han, Y.4
Kim, S.5
-
6
-
-
33846200876
-
Entropy based worm and anomaly detection in fast ip networks
-
A. Wagner and B. Plattner, "Entropy based worm and anomaly detection in fast ip networks," in Proceedings of the 14th IEEE International workshops on Enabling Technologies, Infrastructure for Collaborative Enterprise, Linköping, Sweden, Jun. 2005, pp. 172-177.
-
Proceedings of the 14th IEEE International Workshops on Enabling Technologies, Infrastructure for Collaborative Enterprise, Linköping, Sweden, Jun. 2005
, pp. 172-177
-
-
Wagner, A.1
Plattner, B.2
-
7
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
G. Nychis, V. Sekar, D. G. Andersen, H. Kim, and H. Zhang, "An empirical evaluation of entropy-based traffic anomaly detection," in Proceedings of the 8th ACM SIGCOMM Conference on Internet measurement, Vouliagmeni, Greece, Oct. 2008, pp. 151-156.
-
Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, Vouliagmeni, Greece, Oct. 2008
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
|