-
1
-
-
79952545678
-
-
M. Yamamura, http://service1.symantec.com/sarc/sarc.nsf/html/W32.DoS. Trinoo.html.
-
-
-
Yamamura, M.1
-
3
-
-
79952569548
-
-
D. Bernstein, "Syn cookies," http://cr.yp.to/syncookies.html.
-
-
-
Bernstein, D.1
-
4
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. G. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in NDSS, 1999.
-
(1999)
NDSS
-
-
Juels, A.1
Brainard, J.G.2
-
5
-
-
84949938425
-
DOS-Resistant Authentication with Client Puzzles
-
Security Protocols
-
T. Aura, P. Nikander, and J. Leiwo, "Dos-resistant authentication with client puzzles," in Lecture Notes in Computer Science. Springer-Verlag, 2000, pp. 170-177. (Pubitemid 33347515)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2133
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
6
-
-
84942256107
-
Statistical approaches to ddos attack detection and response
-
Apr.
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to ddos attack detection and response," in Proc. DARPA Information Survivability Conference and Exposition, 2003, vol. 1, Apr. 2003, pp. 303-314.
-
(2003)
Proc. DARPA Information Survivability Conference and Exposition, 2003
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
7
-
-
4143081502
-
A covariance analysis model for ddos attack detection
-
China, Jun.
-
S. Jin and D. Yeung, "A covariance analysis model for ddos attack detection," in Communications, 2004 IEEE International Conference, China, Jun. 2004, pp. 1882-1886.
-
(2004)
Communications, 2004 IEEE International Conference
, pp. 1882-1886
-
-
Jin, S.1
Yeung, D.2
-
8
-
-
6344229700
-
Ddos detection based on feature space modeling
-
IEEE Press, Aug.
-
S.-Y. Jin and D. Yeung, "Ddos detection based on feature space modeling," in Proc. of 2004 International Conference on Machine Learning and Cybernetics, vol. 7. IEEE Press, Aug. 2004, pp. 4210-4215.
-
(2004)
Proc. of 2004 International Conference on Machine Learning and Cybernetics
, vol.7
, pp. 4210-4215
-
-
Jin, S.-Y.1
Yeung, D.2
-
9
-
-
78651538896
-
A novel distributed detection scheme against ddos attack
-
Nov
-
Z. Zhou, D. Xie, and W. Xiong, "A novel distributed detection scheme against ddos attack," Journal of Networks(JNW), vol. 4, no. 9, pp. 921- 928, Nov 2009.
-
(2009)
Journal of Networks(JNW)
, vol.4
, Issue.9
, pp. 921-928
-
-
Zhou, Z.1
Xie, D.2
Xiong, W.3
-
10
-
-
33845567346
-
A novel model for detecting application layer DDoS attacks
-
DOI 10.1109/IMSCCS.2006.252, 1633861, First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
-
Y. Xie and S.-Z. Yu, "A novel model for detecting application layer ddos attacks," in IMSCCS '06: Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences - Volume 2 (IMSCCS'06). Washington, DC, USA: IEEE Computer Society, 2006, pp. 56-63. (Pubitemid 44930605)
-
(2006)
First International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
, vol.2
, pp. 56-63
-
-
Xie, Y.1
Yu, S.-Z.2
-
11
-
-
33744936042
-
A new DDOS detection model using multiple SVMS and TRA
-
Springer
-
J. Seo, C. Lee, T. Shon, K.-H. Cho, and J. Moon, "A new ddos detection model using multiple svms and tra," in Machine Learning and Cybernetics, vol. 3823. Springer, 2005.
-
(2005)
Machine Learning and Cybernetics
, vol.3823
-
-
Seo, J.1
Lee, C.2
Shon, T.3
Cho, K.-H.4
Moon, J.5
-
12
-
-
33745442482
-
A machine learning framework for network anomaly detection using SVM and GA
-
DOI 10.1109/IAW.2005.1495950, 1495950, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
T. Shon, Y. Kim, C. Lee, and J. Moon, "A machine learning framework for network anomaly detection using svm and ga," in Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC, Nagoya, Japan, Jun. 2005, pp. 176-183. (Pubitemid 43948720)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 176-183
-
-
Shon, T.1
Kim, Y.2
Lee, C.3
Moon, J.4
-
13
-
-
16644393989
-
Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
-
205
-
D. Gavrilis and E. Dermatas, "Real-time detection of distributed denial-of-service attacks using rbf networks and statistical features," Comput. Netw. ISDN Syst., vol. 48, no. 2, pp. 235-245, 205.
-
Comput. Netw. ISDN Syst.
, vol.48
, Issue.2
, pp. 235-245
-
-
Gavrilis, D.1
Dermatas, E.2
-
17
-
-
38049169479
-
Defending ddos attacks using hidden markov models and cooperative reinforcement learning
-
Berlin, Heidelberg: Springer-Verlag
-
X. Xu, Y. Sun, and Z. Huang, "Defending ddos attacks using hidden markov models and cooperative reinforcement learning," in PAISI'07: Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics. Berlin, Heidelberg: Springer-Verlag, 2007, pp. 196-207.
-
(2007)
PAISI'07: Proceedings of the 2007 Pacific Asia Conference on Intelligence and Security Informatics
, pp. 196-207
-
-
Xu, X.1
Sun, Y.2
Huang, Z.3
-
18
-
-
11144272176
-
A taxonomy of DDOS attack and DDOS defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of ddos attack and ddos defense mechanisms," SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
19
-
-
72449131513
-
From feature selection to building of bayesian classifiers: A network intrusion detection perspective
-
K.-C. Khor, C.-Y. Ting, and S.-P. Amnuaisuk, "From feature selection to building of bayesian classifiers: A network intrusion detection perspective," American Journal of Applied Sciences 6 (11), pp. 1949- 1960, 2009.
-
(2009)
American Journal of Applied Sciences
, vol.6
, Issue.11
, pp. 1949-1960
-
-
Khor, K.-C.1
Ting, C.-Y.2
Amnuaisuk, S.-P.3
-
20
-
-
79952569908
-
Combining naive bayes and decision tree for adaptive intrusion detection
-
vol. abs/1005.4496, Apr.
-
D. M. Farid, N. Harbi, and M. Z. Rahman, "Combining naive bayes and decision tree for adaptive intrusion detection," CoRR, vol. abs/1005.4496, Apr. 2010.
-
(2010)
CoRR
-
-
Farid, D.M.1
Harbi, N.2
Rahman, M.Z.3
-
21
-
-
0141723181
-
-
October
-
"Kdd cups 1999 data," http://kdd.ics.uci.edu/databases/ kddcup99/ kddcup99.html, October 1999.
-
(1999)
Kdd Cups 1999 Data
-
-
|