메뉴 건너뛰기




Volumn 7, Issue 2, 2011, Pages 121-136

Ddos detection and traceback with decision tree and grey relational analysis

Author keywords

Attacker traceback; Ddos detection; Decision tree; Grey relational analysis

Indexed keywords

DECISION TREES; FLOW PATTERNS; NETWORK SECURITY; PATTERN MATCHING;

EID: 79952585972     PISSN: 17438225     EISSN: 17438233     Source Type: Journal    
DOI: 10.1504/IJAHUC.2011.038998     Document Type: Article
Times cited : (59)

References (33)
  • 4
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • Bloom, B H. (1970) 'Space/time trade-offs in hash coding with allowable errors', Communications of the ACM, Vol. 13, No. 7, July, pp.422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom B, H.1
  • 7
    • 0001829246 scopus 로고
    • Introduction to grey system theory
    • November
    • Deng, J.L. (1989) 'Introduction to grey system theory', The Journal of Grey System, Vol. 1, No. 1, November, pp.1-24.
    • (1989) The Journal of Grey System , vol.1 , Issue.1 , pp. 1-24
    • Deng, J.L.1
  • 9
    • 1242321281 scopus 로고    scopus 로고
    • Ddos attacks and defense mechanisms: Classification and state-of-The-Art
    • April
    • Douligeris, C. and Mitrokotsa, A. (2004) 'DDoS attacks and defense mechanisms: classification and state-of-the-art', Computer Networks, Vol. 44, No. 5, April, pp.643-666.
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 10
    • 76949106169 scopus 로고    scopus 로고
    • A puzzle-based defense strategy against flooding attacks using game theory
    • January-March
    • Fallah, M.S. (2010) 'A puzzle-based defense strategy against flooding attacks using game theory', IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, January-March, pp.5-19.
    • (2010) IEEE Transactions on Dependable and Secure Computing , vol.7 , Issue.1 , pp. 5-19
    • Fallah, M.S.1
  • 11
    • 33947500326 scopus 로고    scopus 로고
    • Comments on data pre-processing for grey relational analysis
    • June
    • Hsia, K.H., Chen, M.Y. and Chang, M.C. (2004) 'Comments on data pre-processing for grey relational analysis', Journal of Grey System, Vol. 7, No. 1, June, pp.15-20.
    • (2004) Journal of Grey System , vol.7 , Issue.1 , pp. 15-20
    • Hsia, K.H.1    Chen, M.Y.2    Chang, M.C.3
  • 15
    • 33646799500 scopus 로고    scopus 로고
    • Statistical-based SYN-flooding detection using programmable network processor
    • 1489006, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
    • Lim B. and Uddin, M.S. (2005) 'Statistical-based SYN-flooding detection using programmable network processor', Proceedings of the 3rd International Conference on Information Technology and Applications (ICITA'05), Vol. 2, July, pp.465-470. (Pubitemid 43763242)
    • (2005) Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005 , vol.II , pp. 465-470
    • Lim, B.1    Uddin, M.S.2
  • 17
    • 0034300783 scopus 로고    scopus 로고
    • Towards trapping wily intruders in the large
    • October
    • Mansfield, G., Ohta, K., Takei, Y., Kato, N. and Nemoto, Y. (2000) 'Towards trapping wily intruders in the large', Computer Networks, Vol. 34, No. 4, October, pp.659-670.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 659-670
    • Mansfield, G.1    Ohta, K.2    Takei, Y.3    Kato, N.4    Nemoto, Y.5
  • 18
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • DOI 10.1109/TDSC.2005.35
    • Mirkovic J. and Reiher, P. (2005) 'D-WARD: a sourceend defense against flooding denial-of-service attacks', IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September, pp.216-232. (Pubitemid 41560432)
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 19
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • April
    • Mirkovic, J. and Reiher, P. (2004) 'A taxonomy of DDoS attack and DDoS defense mechanisms', ACM SIGCOMM Computer Communications Review, Vol. 34, No. 2, April, pp.39-54.
    • (2004) ACM SIGCOMM Computer Communications Review , vol.34 , Issue.2 , pp. 39-54
    • Mirkovic, J.1    Reiher, P.2
  • 21
    • 35048886560 scopus 로고    scopus 로고
    • Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
    • Intelligent Data Engineering and Automated Learning
    • Noh, S., Lee, C., Choi, K. and Jung, G. (2003) 'Detecting distributed denial of service (DDoS) attacks through inductive learning', Proceedings of the 4th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL'03), March, pp.286-295. (Pubitemid 36996100)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2690 , pp. 286-295
    • Noh, S.1    Lee, C.2    Choi, K.3    Jung, G.4
  • 22
    • 35648969617 scopus 로고    scopus 로고
    • A denial of service detector based on maximum likelihood detection and the random neural network
    • DOI 10.1093/comjnl/bxm066
    • Öke, G. and Loukas, G. (2007) 'A denial of service detector based on maximum likelihood detection and the random neural network', The Computer Journal, Vol. 50, No. 6, September, pp.717-727. (Pubitemid 350031419)
    • (2007) Computer Journal , vol.50 , Issue.6 , pp. 717-727
    • Oke, G.1    Loukas, G.2
  • 23
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Peng, T., Leckie, C. and Ramamohanarao, K. (2007) 'Survey of network-based defense mechanisms countering the DoS and DDoS problems', ACM Computing Surveys, Vol. 39, No. 1, pp.1-45.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 1-45
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 24
    • 26844457947 scopus 로고    scopus 로고
    • A Packet Marking scheme for IP traceback
    • Networking - ICN 2005 - 4th International Conference on Networking, Proceedings
    • Qu, H., Su, P., Lin, D. and Feng, D. (2005) 'A packet marking scheme for IP traceback', Proceedings of the International Conference on Networking, April, pp.964-971. (Pubitemid 41452203)
    • (2005) Lecture Notes in Computer Science , vol.3421 , Issue.II , pp. 964-971
    • Qu, H.1    Su, P.2    Lin, D.3    Feng, D.4
  • 25
    • 33744584654 scopus 로고
    • Induction of decision trees
    • Quinlan, J.R. (1986) 'Induction of decision trees', Machine Learning, Vol. 1, No. 1, pp.81-106.
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.