메뉴 건너뛰기




Volumn , Issue , 2011, Pages 210-217

Parametric differences between a real-world Distributed Denial-of-Service attack and a Flash Event

Author keywords

Botnet; Distributed Denial of Service (DDoS); Flash Event; Network security

Indexed keywords

BOTNET; DATA SETS; DDOS ATTACK; DENIAL OF SERVICE ATTACKS; DISTRIBUTED DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE ATTACK; FLASH EVENT; INTERNET ACTIVITY;

EID: 80455144626     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.39     Document Type: Conference Paper
Times cited : (43)

References (29)
  • 1
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the Internet
    • L. Garber, "Denial-of-service attacks rip the Internet," Computer, vol. 33, no. 4, pp. 12-17, 2000.
    • (2000) Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 3
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denial-of-service attacks: A tutorial
    • DOI 10.1109/MCOM.2002.1039856
    • R. Chang, "Defending against flooding-based distributed denial-of service attacks: A tutorial," Communications Magazine, IEEE, vol. 40, no. 10, pp. 42-51, 2002. (Pubitemid 35311945)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 5
    • 80455166416 scopus 로고    scopus 로고
    • Net video not yet ready for prime time
    • J. Borland, "Net video not yet ready for prime time," CNET News. com. February, vol. 5, 1999.
    • (1999) CNET News. Com. February , vol.5
    • Borland, J.1
  • 17
    • 0013264090 scopus 로고    scopus 로고
    • Proactive intrusion detection and distributed denial of service attacks: A case study in security management
    • J. Cabrera, L. Lewis, X. Qin, W. Lee, and R. Mehra, "Proactive intrusion detection and distributed denial of service attacks: A case study in security management," Journal of Network and Systems Management, vol. 10, no. 2, pp. 225-254, 2002.
    • (2002) Journal of Network and Systems Management , vol.10 , Issue.2 , pp. 225-254
    • Cabrera, J.1    Lewis, L.2    Qin, X.3    Lee, W.4    Mehra, R.5
  • 19
    • 84954358597 scopus 로고    scopus 로고
    • Traffic flooding attack detection with SNMP MIB using SVM
    • J. Yu, H. Lee, M. Kim, and D. Park, "Traffic flooding attack detection with SNMP MIB using SVM," Computer Communications, vol. 31, no. 17, pp. 4212-4219, 2008.
    • (2008) Computer Communications , vol.31 , Issue.17 , pp. 4212-4219
    • Yu, J.1    Lee, H.2    Kim, M.3    Park, D.4
  • 20
    • 2942728016 scopus 로고    scopus 로고
    • Telling humans and computers apart automatically
    • L. Von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Communications of the ACM, vol. 47, no. 2, pp. 56-60, 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.2 , pp. 56-60
    • Von Ahn, L.1    Blum, M.2    Langford, J.3
  • 23
    • 56649106403 scopus 로고    scopus 로고
    • Distinguishing between FE and DDoS using randomness check
    • H. Park, P. Li, D. Gao, H. Lee, and R. Deng, "Distinguishing between FE and DDoS Using Randomness Check," Information Security, pp. 131-145, 2008.
    • (2008) Information Security , pp. 131-145
    • Park, H.1    Li, P.2    Gao, D.3    Lee, H.4    Deng, R.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.