-
1
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
Jun.
-
S. S. Kim and A. L. N. Reddy, "Statistical techniques for detecting traffic anomalies through packet header data," IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 562-575, Jun. 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.3
, pp. 562-575
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
2
-
-
53149142525
-
Detecting DoS attacks using packet size distribution
-
P. Du and S. Abe, "Detecting DoS attacks using packet size distribution,"in Proc. 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (BIONETICS '07), Budapest, Hungary, Dec. 10-13, 2007, pp. 93-96.
-
Proc. 2nd International Conference on Bio-Inspired Models of Network, Information, and Computing Systems (BIONETICS '07), Budapest, Hungary, Dec. 10-13, 2007
, pp. 93-96
-
-
Du, P.1
Abe, S.2
-
3
-
-
71049160885
-
An entropy-based countermeasure against intelligent DoS attacks targeting firewalls
-
F. Al-Haidari, M. Sqalli, K. Salah, and J. Hamodi, "An entropy-based countermeasure against intelligent DoS attacks targeting firewalls," in Proc. 2009 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY '09), Imperial College London, UK, Jul. 20-22, 2009, pp. 41-44.
-
Proc. 2009 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY '09), Imperial College London, UK, Jul. 20-22, 2009
, pp. 41-44
-
-
Al-Haidari, F.1
Sqalli, M.2
Salah, K.3
Hamodi, J.4
-
4
-
-
0036804084
-
Defending against flooding-based Distributed Denial-of- Service attacks: A tutorial
-
Oct.
-
R. K. C. Chang, "Defending against flooding-based Distributed Denial-of- Service attacks: A tutorial," IEEE Communications Magazine, vol. 40, no. 10, pp. 42-51, Oct. 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
5
-
-
57949103947
-
TVA: A DoS-limiting network architecture
-
Dec.
-
X. Yang, D. Wetherall, and T. Anderson, "TVA: A DoS-limiting network architecture," IEEE/ACM Transactions on Networking, vol. 16, no. 6, pp. 1267-1280, Dec. 2008.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.6
, pp. 1267-1280
-
-
Yang, X.1
Wetherall, D.2
Anderson, T.3
-
8
-
-
37849002360
-
Towards user-centric metrics for Denial- Of-Service measurement
-
J. Mirković, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W.-M. Yao, and S. Schwab, "Towards user-centric metrics for Denial- Of-Service measurement," in Proc. ACM Workshop on Experimental Computer Science (ExpCS '07), San Diego, CA, USA, Jun. 13-14, 2007, pp. 1-14.
-
Proc. ACM Workshop on Experimental Computer Science (ExpCS '07), San Diego, CA, USA, Jun. 13-14, 2007
, pp. 1-14
-
-
Mirković, J.1
Hussain, A.2
Wilson, B.3
Fahmy, S.4
Reiher, P.5
Thomas, R.6
Yao, W.-M.7
Schwab, S.8
-
9
-
-
34248379606
-
Analyzing large DDoS attacks using multiple data sources
-
Z. M. Mao, V. Sekar, O. Spatscheck, J. van der Merwe, and R. Vasudevan, "Analyzing large DDoS attacks using multiple data sources," in Proc. ACM SIGCOMM Workshop on Large-scale Attack Defense (LSAD '06), Pisa, Italy, Sep. 11, 2006, pp. 161-168.
-
Proc. ACM SIGCOMM Workshop on Large-scale Attack Defense (LSAD '06), Pisa, Italy, Sep. 11, 2006
, pp. 161-168
-
-
Mao, Z.M.1
Sekar, V.2
Spatscheck, O.3
Van Der Merwe, J.4
Vasudevan, R.5
-
10
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Feb.
-
Y. Xie and S.-Z. Yu, "Monitoring the application-layer DDoS attacks for popular websites," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 15-25, Feb. 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
11
-
-
84904888755
-
Attacking DDoS at the source
-
J. Mirković, G. Prier, and P. Reiher, "Attacking DDoS at the source," in Proc. IEEE 10th International Conference on Network Protocols (ICNP '02), Paris, France, Nov. 12-15, 2002, pp. 312-321.
-
Proc. IEEE 10th International Conference on Network Protocols (ICNP '02), Paris, France, Nov. 12-15, 2002
, pp. 312-321
-
-
Mirković, J.1
Prier, G.2
Reiher, P.3
-
12
-
-
63649122695
-
Filtering spoofed traffic at source end for defending against DoS / DDoS attacks
-
S. Malliga, A. Tamilarasi, and M. Janani, "Filtering spoofed traffic at source end for defending against DoS / DDoS attacks," in Proc. IEEE 17th International Conference on Computer, Communication and Networks (ICCCN '08), St. Thomas, Virgin Islands, USA, Aug. 3-7, 2008, pp. 1-5.
-
Proc. IEEE 17th International Conference on Computer, Communication and Networks (ICCCN '08), St. Thomas, Virgin Islands, USA, Aug. 3-7, 2008
, pp. 1-5
-
-
Malliga, S.1
Tamilarasi, A.2
Janani, M.3
-
13
-
-
77958590107
-
A real-time DDoS attack detection and prevention system based on per-IP traffic behavioral analysis
-
Y. Zhang, Q. Liu, and G. Zhao, "A real-time DDoS attack detection and prevention system based on per-IP traffic behavioral analysis," in Proc. IEEE 3rd International Conference on Computer Science and Information Technology (ICCSIT '10), Rome, Italy, Apr. 28-30, 2010, pp. 163-167.
-
Proc. IEEE 3rd International Conference on Computer Science and Information Technology (ICCSIT '10), Rome, Italy, Apr. 28-30, 2010
, pp. 163-167
-
-
Zhang, Y.1
Liu, Q.2
Zhao, G.3
-
14
-
-
33847303101
-
BLINC: Multi-level traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: Multi-level traffic classification in the dark," in Proc. ACM SIGCOMM '05, Philadelphia, PA, USA, Aug. 22-26, 2005, pp. 229-240.
-
Proc. ACM SIGCOMM '05, Philadelphia, PA, USA, Aug. 22-26, 2005
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
|