-
1
-
-
79955000333
-
-
[Online]. Available
-
"The stacheldraht ddos attack tool," 2009. [Online]. Available: http://staff.washington.edu/dittrich/misc/stacheldraht.analysis.txt
-
(2009)
The Stacheldraht Ddos Attack Tool
-
-
-
2
-
-
79955043018
-
-
[Online]. Available
-
"Twitter hit by denial-of-service attack," 2009. [Online]. Available: http://www.cnn.com/2009/TECH/08/06/twitter.attack/index.html
-
(2009)
Twitter Hit by Denial-of-service Attack
-
-
-
3
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "Openflow: enabling innovation in campus networks," SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
4
-
-
70350656962
-
Nox: Towards an operating system for networks
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, "Nox: towards an operating system for networks," SIGCOMM Comput. Commun. Rev, vol. 38, no. 3, pp. 105-110, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev
, vol.38
, Issue.3
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
5
-
-
77950587483
-
Research on the Active DDoS Filtering Algorithm Based on IP Flow
-
IEEE
-
Y. Feng, R. Guo, D.Wang, and B. Zhang, "Research on the Active DDoS Filtering Algorithm Based on IP Flow," in 2009 Fifth International Conference on Natural Computation. IEEE, 2009, pp. 628-632.
-
(2009)
2009 Fifth International Conference on Natural Computation
, pp. 628-632
-
-
Feng, Y.1
Guo, R.2
Wang, D.3
Zhang, B.4
-
6
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
M. Kim, H. Kang, S. Hung, S. Chung, and J. Hong, "A flow-based method for abnormal network traffic detection," in IEEE/IFIP Network Operations and Management Symposium, 2004, pp. 599-612.
-
IEEE/IFIP Network Operations and Management Symposium, 2004
, pp. 599-612
-
-
Kim, M.1
Kang, H.2
Hung, S.3
Chung, S.4
Hong, J.5
-
7
-
-
0025489075
-
The self-organizing map
-
T. Kohonen, "The self-organizing map," Proceedings of the IEEE, vol. 78, no. 9, pp. 1464-1480, 1990.
-
(1990)
Proceedings of the IEEE
, vol.78
, Issue.9
, pp. 1464-1480
-
-
Kohonen, T.1
-
8
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps
-
Springer
-
M. Ramadas, S. Ostermann, and B. Tjaden, "Detecting anomalous network traffic with self-organizing maps," in Recent Advances in Intrusion Detection. Springer, 2003, pp. 36-54.
-
(2003)
Recent Advances in Intrusion Detection
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
9
-
-
33947251166
-
A hierarchical SOM-based intrusion detection system
-
H. Gunes Kayacik, N. Zincir-Heywood et al., "A hierarchical SOM-based intrusion detection system," Engineering Applications of Artificial Intelligence, vol. 20, no. 4, pp. 439-451, 2007.
-
(2007)
Engineering Applications of Artificial Intelligence
, vol.20
, Issue.4
, pp. 439-451
-
-
Kayacik, H.G.1
Zincir-Heywood, N.2
-
11
-
-
74049128211
-
Research on Intrusion Detection Based on an Improved SOM Neural Network
-
IEEE Computer Society
-
D. Jiang, Y. Yang, and M. Xia, "Research on Intrusion Detection Based on an Improved SOM Neural Network," in Proceedings of the 2009 Fifth International Conference on Information Assurance and Security-Volume 01. IEEE Computer Society, 2009, pp. 400-403.
-
(2009)
Proceedings of the 2009 Fifth International Conference on Information Assurance and Security
, vol.1
, pp. 400-403
-
-
Jiang, D.1
Yang, Y.2
Xia, M.3
-
12
-
-
72849145549
-
Intrusion Detection System Using Self-Organizing Maps
-
IEEE
-
M. Alsulaiman, A. Alyahya, R. Alkharboush, and N. Alghafis, "Intrusion Detection System Using Self-Organizing Maps," in 2009 Third International Conference on Network and System Security. IEEE, 2009, pp. 397-402.
-
(2009)
2009 Third International Conference on Network and System Security
, pp. 397-402
-
-
Alsulaiman, M.1
Alyahya, A.2
Alkharboush, R.3
Alghafis, N.4
-
13
-
-
33846985968
-
Detecting denial of service attacks using emergent self-organizing maps
-
A. Mitrokotsa and C. Douligeris, "Detecting denial of service attacks using emergent self-organizing maps," in Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on, 2005, pp. 375-380.
-
Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on, 2005
, pp. 375-380
-
-
Mitrokotsa, A.1
Douligeris, C.2
-
14
-
-
70349577765
-
Grey self-organizing map based intrusion detection
-
C. Wang, H. Yu, and H. Wang, "Grey self-organizing map based intrusion detection," Optoelectronics Letters, vol. 5, no. 1, pp. 64-68, 2009.
-
(2009)
Optoelectronics Letters
, vol.5
, Issue.1
, pp. 64-68
-
-
Wang, C.1
Yu, H.2
Wang, H.3
-
15
-
-
63249108778
-
Efficient Detection of DDoS Attacks with Important Attributes
-
RSM - Dépt. Réseaux, Sécurité et Multimédia (Institut Télécom-Télécom Bretagne), DREAM research group - Diagnosing, REcommending Actions and Modelling (INRIA /IRISA Rennes)
-
W. Wang and S. Gombault, "Efficient Detection of DDoS Attacks with Important Attributes ," in CRISIS 2008, Third International Conference on Risks and Security on Internet and Systems, October 28-30, Tozeur, Tunisia. RSM - Dépt. Réseaux, Sécurité et Multimédia (Institut Télécom-Télécom Bretagne), DREAM research group - Diagnosing, REcommending Actions and Modelling (INRIA /IRISA Rennes), 2008.
-
(2008)
CRISIS 2008, Third International Conference on Risks and Security on Internet and Systems, October 28-30, Tozeur, Tunisia
-
-
Wang, W.1
Gombault, S.2
-
16
-
-
77951198408
-
Unifying Packet and Circuit Switched Networks
-
IEEE, Nov. [Online]. Available
-
S. Das, G. Parulkar, and N. McKeown, "Unifying Packet and Circuit Switched Networks," in Globecomm Workshop on Below IP Networking. IEEE, Nov. 2009. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/ wrapper.htm?arnumber=5360777
-
(2009)
Globecomm Workshop on below IP Networking
-
-
Das, S.1
Parulkar, G.2
McKeown, N.3
-
17
-
-
84889076322
-
-
[Online]. Available
-
"Openflow switch specification," 2010. [Online]. Available: http://www.openflowswitch.org/wp/documents/
-
(2010)
Openflow Switch Specification
-
-
-
19
-
-
84962266851
-
Analysis of neighborhood interaction in kohonen neural networks
-
Z.-P. Lo, M. Fujita, and B. Bavarian, "Analysis of neighborhood interaction in kohonen neural networks," in 6th International Parallel Processing Symposium, Los Alamitos, CA, 1991, pp. 246-249.
-
6th International Parallel Processing Symposium, Los Alamitos, CA, 1991
, pp. 246-249
-
-
Lo, Z.-P.1
Fujita, M.2
Bavarian, B.3
-
20
-
-
66249128606
-
How to test dos defenses
-
Washington, DC, USA: IEEE Computer Society
-
J. Mirkovic, S. Fahmy, P. Reiher, and R. K. Thomas, "How to test dos defenses," in CATCH '09: Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security. Washington, DC, USA: IEEE Computer Society, 2009, pp. 103-117.
-
(2009)
CATCH '09: Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security
, pp. 103-117
-
-
Mirkovic, J.1
Fahmy, S.2
Reiher, P.3
Thomas, R.K.4
-
21
-
-
70349684725
-
Seven years and one day: Sketching the evolution of internet traffic
-
April
-
P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, "Seven years and one day: Sketching the evolution of internet traffic," in INFOCOM 2009, IEEE, April 2009, pp. 711-719.
-
(2009)
INFOCOM 2009, IEEE
, pp. 711-719
-
-
Borgnat, P.1
Dewaele, G.2
Fukuda, K.3
Abry, P.4
Cho, K.5
-
23
-
-
79955015815
-
-
[Online]. Available
-
"Manual of wirefilter," 2010. [Online]. Available: http://www.linuxcertif.com/man/1/wirefilter/
-
(2010)
Manual of Wirefilter
-
-
|