메뉴 건너뛰기




Volumn 23, Issue 6, 2012, Pages 1073-1080

Discriminating DDoS attacks from flash crowds using flow correlation coefficient

Author keywords

DDoS attacks; discrimination; flash crowds; similarity

Indexed keywords

ATTACK FLOW; BOTNETS; CRITICAL CHALLENGES; DDOS ATTACK; DISCRIMINATION; DISCRIMINATION ALGORITHMS; DISTRIBUTED DENIAL OF SERVICE ATTACK; FLASH CROWD; FLOW CORRELATION; SIMILARITY; SIMILARITY METRICS; TRAFFIC PATTERN;

EID: 84860543902     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2011.262     Document Type: Article
Times cited : (195)

References (25)
  • 1
  • 5
    • 36249008514 scopus 로고    scopus 로고
    • A survey of bots used for distributed denial of service attacks
    • V.L.L. Thing, M. Sloman, and N. Dulay, "A Survey of Bots Used for Distributed Denial of Service Attacks," Proc. SEC, pp. 229-240, 2007.
    • (2007) Proc. SEC , pp. 229-240
    • Thing, V.L.L.1    Sloman, M.2    Dulay, N.3
  • 8
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
    • 252-262
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites," Proc. 11th Int'l Conf. World Wide Web (WWW), pp. 252-262, 2002.
    • (2002) Proc. 11th Int'l Conf. World Wide Web (WWW
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 9
    • 33847761464 scopus 로고    scopus 로고
    • Non-Gaussian and long memory statistical characterizations for Internet traffic with anomalies
    • DOI 10.1109/TDSC.2007.12
    • A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies," IEEE Trans. Dependable Secure Computing, vol. 4, no. 1, pp. 56-70, Jan.-Mar. 2007. (Pubitemid 46384621)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.1 , pp. 56-70
    • Scherrer, A.1    Larrieu, N.2    Owezarski, P.3    Borgnat, P.4    Abry, P.5
  • 10
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-service attack-detection techniques
    • DOI 10.1109/MIC.2006.5
    • G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-Service Attack-Detection Techniques," IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, Jan./Feb. 2006. (Pubitemid 43159617)
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.R.3    Rai, S.4
  • 11
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • DOI 10.1016/j.jpdc.2006.04.007, PII S0743731506000852
    • Y. Chen and K. Hwang, "Collaborative Detection and Filtering of Shrew DDoS Attacks Using Spectral Analysis," J. Parallel Distributed Computing, vol. 66, no. 9, pp. 1137-1151, 2006. (Pubitemid 44205394)
    • (2006) Journal of Parallel and Distributed Computing , vol.66 , Issue.9 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 13
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
    • Feb
    • Y. Xie and S.-Z. Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors," IEEE/ACM Trans. Networking, vol. 17, no. 1, pp. 54-65, Feb. 2009.
    • (2009) IEEE/ ACM Trans. Networking , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.-Z.2
  • 14
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer ddos attacks for popular websites
    • Feb
    • Y. Xie and S.-Z. Yu, "Monitoring the Application-Layer DDoS Attacks for Popular Websites," IEEE/ACM Trans. Networking, vol. 17, no. 1, pp. 15-25, Feb. 2009.
    • (2009) IEEE/ ACM Trans. Networking , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2
  • 15
    • 70449513306 scopus 로고    scopus 로고
    • Modeling human behavior for defense against flash-crowd attacks
    • G. Oikonomou and J. Mirkovic, "Modeling Human Behavior for Defense against Flash-Crowd Attacks," Proc. IEEE Int'l Conf. Comm., 2009.
    • (2009) Proc. IEEE Int'l Conf. Comm.
    • Oikonomou, G.1    Mirkovic, J.2
  • 17
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and ddos problems
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems," ACM Computing Survey, vol. 39, no. 1, pp. 123-128, 2007.
    • (2007) ACM Computing Survey , vol.39 , Issue.1 , pp. 123-128
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 21
    • 84969280632 scopus 로고    scopus 로고
    • WorldCup98, http://ita.ee.lbl.gov/html/contrib/WorldCup. html. 2011.
    • (2011) WorldCup98
  • 22
    • 0029323403 scopus 로고
    • Wide area traffic: The failure of poisson modeling
    • June
    • V. Paxson and S. Floyd, "Wide Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Trans. Networking, vol. 3, no. 3, pp. 226-244, June 1995.
    • (1995) IEEE/ ACM Trans. Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 23
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: Evidence and possible causes
    • PII S1063669297087827
    • M.E. Crovella and A. Bestavros, "Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes," IEEE/ACM Trans. Networking, vol. 5, no. 6, pp. 835-846, Dec. 1997. (Pubitemid 127768491)
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.