-
1
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
April
-
J. Mirkovic and P. Reiher, "A taxonomy of ddos attack and ddos defense mechanisms," SIGCOMM Comput. Commun. Rev., vol. 34, pp. 39-53, April 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
2
-
-
84870631425
-
-
Nov. [Online]
-
Amazon Web Services. (2010, Nov.) Amazon EC2 pricing. [Online]. Available: http://aws.amazon.com/ec2/pricing/
-
(2010)
Amazon EC2 Pricing
-
-
-
3
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
ser. NSDI'05
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds," in Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2, ser. NSDI'05, 2005, pp. 287-300.
-
(2005)
Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation
, vol.2
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
4
-
-
77956240814
-
Botnet economics: Uncertainty matters
-
Springer US
-
Z. Li, Q. Liao, and A. Striegel, "Botnet economics: Uncertainty matters," in Managing Information Risk and the Economics of Security. Springer US, 2009, pp. 245-267.
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 245-267
-
-
Li, Z.1
Liao, Q.2
Striegel, A.3
-
6
-
-
78650391156
-
Cald: Surviving various application-layer ddos attacks that mimic flash crowd
-
S. Wen, W. Jia, W. Zhou, W. Zhou, and C. Xu, "Cald: Surviving various application-layer ddos attacks that mimic flash crowd," in 2010 4th International Conference on Network and System Security (NSS), 2010, pp. 247-254.
-
(2010)
2010 4th International Conference on Network and System Security (NSS)
, pp. 247-254
-
-
Wen, S.1
Jia, W.2
Zhou, W.3
Zhou, W.4
Xu, C.5
-
7
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
-
New York, NY, USA: ACM
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: characterization and implications for cdns and web sites," in Proceedings of the 11th international conference on World Wide Web. New York, NY, USA: ACM, 2002, pp. 293-304.
-
(2002)
Proceedings of the 11th International Conference on World Wide Web
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
10
-
-
80053143418
-
Detecting blog spams using the vocabulary size of all substrings in their copies
-
K. Narisawa, D. Ikeda, Y. Yamada, and M. Takeda, "Detecting blog spams using the vocabulary size of all substrings in their copies," in In Proceedings of Workshop on Weblogging Ecosystem, 2006.
-
(2006)
Proceedings of Workshop on Weblogging Ecosystem
-
-
Narisawa, K.1
Ikeda, D.2
Yamada, Y.3
Takeda, M.4
-
11
-
-
56049089379
-
An investigation of zipf's law for fraud detection
-
December
-
S.-M. Huang, D. C. Yen, L.-W. Yang, and J.-S. Hua, "An investigation of zipf's law for fraud detection," Decis. Support Syst., vol. 46, pp. 70-83, December 2008.
-
(2008)
Decis. Support Syst.
, vol.46
, pp. 70-83
-
-
Huang, S.-M.1
Yen, D.C.2
Yang, L.-W.3
Hua, J.-S.4
-
12
-
-
0032670943
-
Web caching and zipf-like distributions: Evidence and implications
-
Mar. 1
-
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and zipf-like distributions: evidence and implications," in Proceedings of IEEE INFOCOM '99, vol. 1, Mar. 1999, pp. 126-134 Vol.1.
-
(1999)
Proceedings of IEEE INFOCOM '99
, vol.1
, pp. 126-134
-
-
Breslau, L.1
Cao, P.2
Fan, L.3
Phillips, G.4
Shenker, S.5
-
13
-
-
77951521869
-
Sessionsim: Activity-based session generation for network simulation
-
Proceedings of the 2009
-
L. Kroc, S. Eidenbenz, and J. Smith, "Sessionsim: Activity-based session generation for network simulation," in Winter Simulation Conference (WSC), Proceedings of the 2009, 2009, pp. 3169-3180.
-
(2009)
Winter Simulation Conference (WSC)
, pp. 3169-3180
-
-
Kroc, L.1
Eidenbenz, S.2
Smith, J.3
-
14
-
-
34548812317
-
Methods of distinguishing flash crowds from spoofed DoS attacks
-
DOI 10.1109/NGI.2007.371212, 4231835, NGI 2007: 2007 Next Generation Internet Networks - 3rd EuroNGI Conference on Next Generation Internet Networks: Design and Engineering for Heterogeneity
-
Q. Le, M. Zhanikeev, and Y. Tanaka, "Methods of distinguishing flash crowds from spoofed DoS attacks," in Next Generation Internet Networks, 3rd EuroNGI Conference on, May 2007, pp. 167-173. (Pubitemid 47439984)
-
(2007)
NGI 2007: 2007 Next Generation Internet Networks - 3rd EuroNGI Conference on Next Generation Internet Networks: Design and Engineering for Heterogeneity
, pp. 167-173
-
-
Le, T.Q.1
Zhanikeev, M.2
Tanaka, Y.3
-
16
-
-
22344444634
-
New method of shooting of soccer robot based on genetic-fuzzy algorithm
-
J. Wang, X. Yang, and K. Long, "A new relative entropy based app-DDoS detection method," in IEEE Symposium on Computers and Communications (ISCC), 2010, pp. 966-968. (Pubitemid 41000565)
-
(2005)
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology
, vol.37
, Issue.7
, pp. 966-968
-
-
Luo, Z.-X.1
Wang, Q.2
Wang, J.-G.3
-
17
-
-
61449135082
-
Monitoring the application-layer ddos attacks for popular websites
-
IEEE/ACM Transactions on
-
Y. Xie and S.-Z. Yu, "Monitoring the application-layer ddos attacks for popular websites," Networking, IEEE/ACM Transactions on, vol. 17, no. 1, pp. 15-25, 2009.
-
(2009)
Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
19
-
-
61449207953
-
DDoS-shield: Ddos-resilient scheduling to counter application layer attacks
-
February
-
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, "DDoS-shield: DDoS-resilient scheduling to counter application layer attacks," IEEE/ACM Trans. Netw., vol. 17, pp. 26-39, February 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Nucci, A.4
Knightly, E.5
|