-
1
-
-
79956153885
-
Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
-
[Online]. Available
-
A. Chonka et al., "Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks," J. Netw. Comput. Applicat. Jun. 23, 2010 [Online]. Available: http://dx.doi.org/10.1016/j. jnca.2010.06.004
-
(2010)
J. Netw. Comput. Applicat. Jun.
, vol.23
-
-
Chonka, A.1
-
2
-
-
33746880318
-
ZSBT: A novel algorithm for tracing DoS attackers in MANETs
-
X. Jin et al., "ZSBT: A novel algorithm for tracing DoS attackers in MANETs," EURASIP J. Wireless Commun. Netw., vol. 2006, no. 2, pp. 1-9, 2006.
-
(2006)
EURASIP J. Wireless Commun. Netw.
, vol.2006
, Issue.2
, pp. 1-9
-
-
Jin, X.1
-
3
-
-
17744370129
-
Low rate TCP denial-of-service attack detection at edge routers
-
DOI 10.1109/LCOMM.2005.04008
-
A. Shevtekar, K. Anantharam, and N. Ansari, "Low rate TCP Denial- of-Service attack detection at edge routers," IEEE Commun. Lett., vol. 9, no. 4, pp. 363-365, Apr. 2005. (Pubitemid 40573761)
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.4
, pp. 363-365
-
-
Shevtekar, A.1
Anantharam, K.2
Ansari, N.3
-
4
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
DOI 10.1109/MIC.2006.5
-
G. Carl et al., "Denial-of-service attack-detection techniques," IEEE Internet Comput., vol. 10, no. 1, pp. 82-89, Jan./Feb. 2006. (Pubitemid 43159617)
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
5
-
-
68149178268
-
IP packet size entropy-based scheme for detection of DoS/DDoS attacks
-
P. Du and S. Abe, "IP packet size entropy-based scheme for detection of DoS/DDoS attacks," IEICE Trans. Inf. Syst., vol. E91-D, no. 5, pp. 1274-1281, 2008.
-
(2008)
IEICE Trans. Inf. Syst.
, vol.E91-D
, Issue.5
, pp. 1274-1281
-
-
Du, P.1
Abe, S.2
-
6
-
-
0002974997
-
Synthesis of fractional Gaussian noise using linear approximation for generating self-similar network traffic
-
S. Ledesma and D. Liu, "Synthesis of fractional Gaussian noise using linear approximation for generating self-similar network traffic," Comput. Commun. Rev., vol. 30, no. 2, pp. 4-17, 2000.
-
(2000)
Comput. Commun. Rev.
, vol.30
, Issue.2
, pp. 4-17
-
-
Ledesma, S.1
Liu, D.2
-
7
-
-
0035339968
-
N th-order fractional Brownian motion and fractional Gaussian noises
-
DOI 10.1109/78.917808, PII S1053587X01034729
-
E. Perrin et al., "N th-order fractional Brownian motion and fractional Gaussian noises," IEEE Trans. Signal Process., vol. 49, no. 5, pp. 1049-1059, May 2001. (Pubitemid 32444203)
-
(2001)
IEEE Transactions on Signal Processing
, vol.49
, Issue.5
, pp. 1049-1059
-
-
Perrin, E.1
Harba, R.2
Berzin-Joseph, C.3
Iribarren, I.4
Bonami, A.5
-
8
-
-
0036859273
-
Fast and exact synthesis for 1-D fractional Brownian motion and fractional Gaussian noises
-
DOI 10.1109/LSP.2002.805311
-
E. Perrin et al., "Fast and exact synthesis for 1-D fractional Brownian motion and fractional Gaussian noises," IEEE Signal Process. Lett., vol. 9, no. 11, pp. 382-384, Nov. 2002. (Pubitemid 35428554)
-
(2002)
IEEE Signal Processing Letters
, vol.9
, Issue.11
, pp. 382-384
-
-
Perrin, E.1
Harba, R.2
Jennane, R.3
Iribarren, I.4
-
10
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," in Proc. ACM SIGCOMM Conf. Internet Measurement (IMC 2005), 2005, pp. 32-32.
-
(2005)
Proc. ACM SIGCOMM Conf. Internet Measurement (IMC 2005)
, pp. 32-32
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
11
-
-
0038011179
-
Specification based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar et al., "Specification based anomaly detection: A new approach for detecting network intrusions," in Proc. ACM Conf. Computer and Communications Security (CCS 2002), 2002, pp. 265-274.
-
(2002)
Proc. ACM Conf. Computer and Communications Security (CCS 2002)
, pp. 265-274
-
-
Sekar, R.1
-
12
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
-
A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Comput. Netw., vol. 51, no. 12, pp. 3448-3470, 2007. (Pubitemid 46921030)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
13
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423 and 623-656, 1948.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
14
-
-
0347585673
-
Rényi extrapolation of Shannon entropy
-
K. Zyczkowski, "Rényi extrapolation of Shannon entropy," Open Syst. Inf. Dynamics, vol. 10, no. 3, pp. 297-310, 2003.
-
(2003)
Open Syst. Inf. Dynamics
, vol.10
, Issue.3
, pp. 297-310
-
-
Zyczkowski, K.1
-
15
-
-
34548183355
-
A distributed approach using entropy to detect DDoS attacks in ISP domain
-
K. J. Kumar, R. C. Joshi, and K. Singh, "A distributed approach using entropy to detect DDoS attacks in ISP domain," in Proc. Int. Conf. Signal Processing, Communications and Networking (ICSCN 2007), 2007, pp. 331-337.
-
Proc. Int. Conf. Signal Processing, Communications and Networking (ICSCN 2007)
, vol.2007
, pp. 331-337
-
-
Kumar, K.J.1
Joshi, R.C.2
Singh, K.3
-
16
-
-
0026914305
-
Distribution estimation consistent in total variation and in two types of information divergence
-
Sep.
-
A. R. Barron, L. Gyorfi, and E. C. van der Meulen, "Distribution estimation consistent in total variation and in two types of information divergence," IEEE Trans. Inf. Theory, vol. 38, no. 5, pp. 1437-1454, Sep. 1992.
-
(1992)
IEEE Trans. Inf. Theory
, vol.38
, Issue.5
, pp. 1437-1454
-
-
Barron, A.R.1
Gyorfi, L.2
Van Der Meulen, E.C.3
-
17
-
-
0038038302
-
Estimation of the Kullback-Leibler divergence
-
Princeton, NJ: Princeton Univ. Press
-
M. Broniatowski, "Estimation of the Kullback-Leibler divergence," in Mathematical Methods of Statistics. Princeton, NJ: Princeton Univ. Press, 2003.
-
(2003)
Mathematical Methods of Statistics
-
-
Broniatowski, M.1
-
18
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
DOI 10.1109/TPDS.2007.1111
-
Y. Chen, K. Hwang, and W.-S. Ku, "Collaborative detection of DDoS attacks over multiple network domains," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 12, pp. 1649-1662, Dec. 2007. (Pubitemid 350142414)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
19
-
-
41749090011
-
On some entropy functionals derived from Rényi information divergence
-
J.-F. Bercher, "On some entropy functionals derived from Rényi information divergence," Inf. Sci., vol. 178, no. 12, pp. 2489-2506, 2008.
-
(2008)
Inf. Sci.
, vol.178
, Issue.12
, pp. 2489-2506
-
-
Bercher, J.-F.1
-
20
-
-
67649889403
-
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
-
Apr.
-
Y. Xiang, W. Zhou, and M. Guo, "Flexible deterministic packet marking: An IP traceback system to find the real source of attacks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567-580, Apr. 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.4
, pp. 567-580
-
-
Xiang, Y.1
Zhou, W.2
Guo, M.3
-
21
-
-
79957507657
-
-
MIT Lincoln Laboratory Data Sets [Online]. Available
-
MIT Lincoln Laboratory Data Sets [Online]. Available: http:// www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/ 2000/LLS-DDOS-0.2.2.html
-
-
-
-
22
-
-
79957518374
-
-
CAIDA, 2010 [Online]. Available: http://data.caida.org/datasets/security/ ddos-20070804/
-
(2010)
CAIDA [Online]. Available
-
-
-
23
-
-
33745205813
-
Inferring Internet denial-of-service activity
-
D. Moore et al., "Inferring Internet denial-of-service activity," ACM Trans. Comput. Syst., vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
ACM Trans. Comput. Syst.
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
-
24
-
-
25844469597
-
You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers
-
DOI 10.1109/TPDS.2005.114
-
T. K. T. Law, J. C. S. Lui, and D. K. Y. Yau, "You can run, but you can't hide: An effective statistical methodology to trace back DDoS attackers," IEEE Trans. Parallel Distrib. Syst., vol. 16, no. 9, pp. 799-813, Sep. 2005. (Pubitemid 41387761)
-
(2005)
IEEE Transactions on Parallel and Distributed Systems
, vol.16
, Issue.9
, pp. 799-813
-
-
Law, T.K.T.1
Lui, J.C.S.2
Yau, D.K.Y.3
-
28
-
-
17744379157
-
Defending against low-rate TCP attacks: Dynamic detection and protection
-
H. Sun, J. C. S. Lui, and D. K. Y. Yau, "Defending against low-rate TCP attacks: Dynamic detection and protection," in Proc. IEEE Int. Conf. Network Protocols (ICNP 2004), 2004, pp. 196-205.
-
Proc. IEEE Int. Conf. Network Protocols (ICNP 2004)
, vol.2004
, pp. 196-205
-
-
Sun, H.1
Lui, J.C.S.2
Yau, D.K.Y.3
-
30
-
-
58149490850
-
Information theory based detection against network behavior mimicking DDoS attacks
-
Apr.
-
S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking DDoS attacks," IEEE Commun. Lett., vol. 12, no. 4, pp. 319-321, Apr. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.4
, pp. 319-321
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
|