메뉴 건너뛰기




Volumn 34, Issue 2, 2011, Pages 395-405

A flooding-based DDoS detection algorithm based on non-linear preprocessing network traffic predicted method

Author keywords

Distributed denial of service; Network traffic prediction; Non linear preprocessing; Real time detection

Indexed keywords

ACCURACY RATE; CLASSIC ALGORITHM; DDOS ATTACK; DDOS DETECTION; DETECTION ALGORITHM; DETECTION METHODS; DETECTION RATES; DISTRIBUTED DENIAL OF SERVICE; EFFICIENT ALGORITHM; NETWORK CHARACTERISTICS; NETWORK TRAFFIC; NON-LINEAR; REAL-TIME DETECTION;

EID: 79953663971     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: 10.3724/SP.J.1016.2011.00395     Document Type: Article
Times cited : (9)

References (18)
  • 2
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Peng Tao, Leckie Christopher, Ramamohanarao Kotagiri. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys, 2007, 39(1): 3
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 3
    • Tao, P.1    Christopher, L.2    Kotagiri, R.3
  • 3
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • Taipei, Taiwan
    • Cheng Chen-Mou, Kung H T, Tan Koan-Sin. Use of spectral analysis in defense against DoS attacks//Proceedings of the IEEE GLOBECOM. Taipei, Taiwan, 2002, 3: 2143-2148
    • (2002) Proceedings of the IEEE GLOBECOM , vol.3 , pp. 2143-2148
    • Cheng, C.-M.1    Kung, H.T.2    Tan, K.-S.3
  • 5
    • 33646204244 scopus 로고    scopus 로고
    • Spectroscopy of DNS update traffic
    • San Diego, CA
    • Broido Andre, Nemeth Evi, Claffy K C. Spectroscopy of DNS update traffic//Proceedings of the ACM SIGMETRICS. San Diego, CA, 2003, 31(1): 320-321
    • (2003) Proceedings of the ACM SIGMETRICS , vol.31 , Issue.1 , pp. 320-321
    • Andre, B.1    Evi, N.2    Claffy, K.C.3
  • 9
    • 34249998365 scopus 로고    scopus 로고
    • Real-time detection of DDoS attack based on VTP
    • (in Chinese)
    • Li Jin-Ming, Wang Ru-Chuan. Real-time detection of DDoS attack based on VTP. Acta Electronica Sinica, 2007, 35(4): 791-796(in Chinese)
    • (2007) Acta Electronica Sinica , vol.35 , Issue.4 , pp. 791-796
    • Li, J.-M.1    Wang, R.-C.2
  • 11
    • 33749462128 scopus 로고    scopus 로고
    • Wavelet analysis method for detection of DDoS attack based on self-similar
    • (in Chinese)
    • Ren Xun-Yi, Wang Ru-Chuan, Wang Hai-Yan. Wavelet analysis method for detection of DDoS attack based on self-similar. Journal on Communications, 2006, 27(5): 6-11(in Chinese)
    • (2006) Journal on Communications , vol.27 , Issue.5 , pp. 6-11
    • Ren, X.-Y.1    Wang, R.-C.2    Wang, H.-Y.3
  • 12
    • 0035402121 scopus 로고    scopus 로고
    • Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems
    • Nash D A, Ragsdale D J. Simulation of self-similarity in network utilization patterns as a precursor to automated testing of intrusion detection systems. IEEE Transactions on Systems, Man and Cybernetics, Part A, 2001, 31(4): 327-331
    • (2001) IEEE Transactions on Systems, Man and Cybernetics, Part A , vol.31 , Issue.4 , pp. 327-331
    • Nash, D.A.1    Ragsdale, D.J.2
  • 13
    • 35048886720 scopus 로고    scopus 로고
    • A novel DDoS attack detecting algorithm based on the continuous wavelet transform
    • Zhenjiang, China
    • Yang Xin-Yu, Liu Yong, Zeng Ming, Shi Yi. A novel DDoS attack detecting algorithm based on the continuous wavelet transform//Proceedings of the Advanced Workshop on Content Computing. Zhenjiang, China, 2004, 3309: 173-181
    • (2004) Proceedings of the Advanced Workshop on Content Computing , vol.3309 , pp. 173-181
    • Yang, X.-Y.1    Liu, Y.2    Zeng, M.3    Shi, Y.4
  • 15
    • 4143073642 scopus 로고    scopus 로고
    • Multi-scale high-speed network traffic prediction using k-factor Gegenbauer ARMA model
    • Paris, France
    • Sadek N, Khotanzad A. Multi-scale high-speed network traffic prediction using k-factor Gegenbauer ARMA model//Proceedings of the IEEE International Conference on Communications. Paris, France, 2004, 4: 2148-2152
    • (2004) Proceedings of the IEEE International Conference on Communications , vol.4 , pp. 2148-2152
    • Sadek, N.1    Khotanzad, A.2
  • 16
    • 1342264186 scopus 로고    scopus 로고
    • On the testing for alpha-stable distributions of network traffic
    • Ge Xiao-Hu, Zhu Guang-Xi, Zhu Yao-Ting. On the testing for alpha-stable distributions of network traffic. Computer Communications, 2004, 27(5): 447-457
    • (2004) Computer Communications , vol.27 , Issue.5 , pp. 447-457
    • Ge, X.-H.1    Zhu, G.-X.2    Zhu, Y.-T.3
  • 18
    • 49749087751 scopus 로고    scopus 로고
    • Universite Paul Sabatier. Annales de la Faculte des Sciences de Toulouse
    • Gennandy Samorodnitsky. Long Memory and Self-Similar Processes. Universite Paul Sabatier. Annales de la Faculte des Sciences de Toulouse. [OL]. Available: http://afst.cedram.org/item?id=AFST_2006_6_15_1_107_0, 2006, XV(1): 107-123
    • (2006) Long Memory and Self-Similar Processes , vol.15 , Issue.1 , pp. 107-123
    • Samorodnitsky, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.