-
1
-
-
0141427794
-
A signal analysis of network traffic anomalies [C]
-
ACM Marseille, France
-
P. Barford, J. Kline, D. Plonka, and A. Ron A signal analysis of network traffic anomalies [C] ACM Proc. Internet measurement workshop 2002 ACM Marseille, France 6 8
-
(2002)
ACM Proc. Internet Measurement Workshop
, pp. 6-8
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
3
-
-
77951928793
-
RRED: Robust RED algorithm to counter low-rate denial-of-service attacks
-
Zhang Chang-wang, Yin Jian-ping, Cai Zhi-ping, and Chen Wei-feng RRED: robust RED algorithm to counter low-rate denial-of-service attacks IEEE Communications Letters 14 5 2010 489 491
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.5
, pp. 489-491
-
-
Chang-Wang, Z.1
Jian-Ping, Y.2
Zhi-Ping, C.3
Wei-Feng, C.4
-
4
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
DOI 10.1016/j.jpdc.2006.04.007, PII S0743731506000852
-
Yu Chen, and Kai Hwang Collaborative detection and filtering of shrew DDoS attacks using spectral analysis Journal of Parallel and Distributed Computing, special issue on Security in Grids and Distributed Systems 66 9 2006 1137 1151 (Pubitemid 44205394)
-
(2006)
Journal of Parallel and Distributed Computing
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
5
-
-
77951971316
-
Collaborative defense against periodic shrew DDoS attacks in frequency domain[C]
-
ACM Los Angeles, California, USA
-
Yu Chen, KaiI Hwang, and Kwok Yu-Kwong Collaborative defense against periodic shrew DDoS attacks in frequency domain[C] ACM transactions on information and system security (TISSEC) 2005 ACM Los Angeles, California, USA 2 27
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, pp. 2-27
-
-
Chen, Y.1
Hwang, K.2
Yu-Kwong, K.3
-
6
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks[C]
-
IEEE Taipei, China
-
C.M. Cheng, H. Kung, and K.S. Tan Use of spectral analysis in defense against DoS attacks[C] Proc. IEEE GLOBECOM 2002 IEEE Taipei, China 2143 2148
-
(2002)
Proc. IEEE GLOBECOM
, pp. 2143-2148
-
-
Cheng, C.M.1
Kung, H.2
Tan, K.S.3
-
7
-
-
77955400669
-
Identification of traffic flows hiding behind TCP Port 80
-
A. Dainotti, F. Gargiulo, L.I. Kuncheva, A. Pescapè, and C. Sansone Identification of traffic flows hiding behind TCP Port 80 2010 IEEE international conference on communications (ICC) 2010 1 6
-
(2010)
2010 IEEE International Conference on Communications (ICC)
, pp. 1-6
-
-
Dainotti, A.1
Gargiulo, F.2
Kuncheva, L.I.3
Pescapè, A.4
Sansone, C.5
-
9
-
-
74249088444
-
Survey of network security systems to counter SIP-based denial-of-service attacks
-
Elsevier
-
S. Ehlert, D. Geneiatakis, and T. Magendaz Survey of network security systems to counter SIP-based denial-of-service attacks Computer & Security 29 2 2010 225 243 Elsevier
-
(2010)
Computer & Security
, vol.29
, Issue.2
, pp. 225-243
-
-
Ehlert, S.1
Geneiatakis, D.2
Magendaz, T.3
-
10
-
-
70349440967
-
Utilizing bloom filters for detecting flooding attacks against SIP based services
-
Elsevier
-
D. Geneiatakis, N. Vrakas, and C. Lambrinoudakis Utilizing bloom filters for detecting flooding attacks against SIP based services Computer & Security 28 2009 578 591 Elsevier
-
(2009)
Computer & Security
, vol.28
, pp. 578-591
-
-
Geneiatakis, D.1
Vrakas, N.2
Lambrinoudakis, C.3
-
11
-
-
79960610298
-
Detection and tracking weak periodic signal[J]
-
[in Chinese]
-
Zhang Guo-jie Detection and tracking weak periodic signal[J] Journal of Data Acquisition & Processing 6 1 1991 16 22 [in Chinese]
-
(1991)
Journal of Data Acquisition & Processing
, vol.6
, Issue.1
, pp. 16-22
-
-
Guo-Jie, Z.1
-
12
-
-
0003254064
-
A non-intrusive, wavelet-based approach to detecting network performance problems[C]
-
ACM San Francisco, CA, USA
-
P. Huang, A. Feldmann, and W. Willinger A non-intrusive, wavelet-based approach to detecting network performance problems[C] Proc. ACM SIGCOMM Internet measurement workshop 2001 ACM San Francisco, CA, USA 1 2
-
(2001)
Proc. ACM SIGCOMM Internet Measurement Workshop
, pp. 1-2
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
13
-
-
84861095986
-
Reliable anomaly detecting system against low-rate DDoS attack[J]
-
[in Chinese]
-
Tian Kai-lin, and Li Ming Reliable anomaly detecting system against low-rate DDoS attack[J] Modern Electronic Technique 32 7 2009 68 70 [in Chinese]
-
(2009)
Modern Electronic Technique
, vol.32
, Issue.7
, pp. 68-70
-
-
Kai-Lin, T.1
Ming, L.2
-
14
-
-
59649106635
-
On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
-
V. Kumar, P. Jayalekshmy, G. Patra, and R. Thangavelu On remote exploitation of TCP sender for low-rate flooding denial-of-service attack IEEE Communications Letters 13 1 2009 46 48
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.1
, pp. 46-48
-
-
Kumar, V.1
Jayalekshmy, P.2
Patra, G.3
Thangavelu, R.4
-
15
-
-
1242287727
-
Low-rate TCP-targeted denial of service attacks - The shrew vs the mice and elephants[C]
-
ACM Karlsruhe, Germany
-
A. Kuzmanovic, and E.W. Knightly Low-rate TCP-targeted denial of service attacks-the shrew vs the mice and elephants[C] Proc. ACM SIGCOMM 2003 2003 ACM Karlsruhe, Germany 75 86
-
(2003)
Proc. ACM SIGCOMM 2003
, pp. 75-86
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
16
-
-
33744524845
-
Low-rate TCP-targeted denial of service attacks and counter strategies
-
DOI 10.1109/TNET.2006.880180
-
Aleksandar Kuzmanovic, and Edward W. Knightly Low-rate TCP-targeted denial of service attacks and counter strategies [J] IEEE/ACM Transactions on Networking 14 4 2006 683 696 (Pubitemid 46405435)
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, Issue.4
, pp. 683-696
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
18
-
-
0024627949
-
The second-order moments of the sample covariances for time series with missing observations
-
Y. Rosen, and B. Porat The second-order moments of the sample covariances for time series with missing observations IEEE Transactions on Information Theory 35 2 1989 334 341
-
(1989)
IEEE Transactions on Information Theory
, vol.35
, Issue.2
, pp. 334-341
-
-
Rosen, Y.1
Porat, B.2
-
20
-
-
65349165972
-
A low-rate DoS detection method based on feature extraction using wavelet transform[J]
-
He Yan-Xiang, Cao Qiang, Liu Tao, Han Yi, and Xiong Qi A low-rate DoS detection method based on feature extraction using wavelet transform[J] Journal of Software 20 4 2009 930 941
-
(2009)
Journal of Software
, vol.20
, Issue.4
, pp. 930-941
-
-
Yan-Xiang, H.1
Qiang, C.2
Tao, L.3
Yi, H.4
Qi, X.5
-
21
-
-
64849092420
-
A survey of low-rate denial-of-service attacks[J]
-
[in Chinese]
-
He Yan-xiang, Liu Tao, Cao Qiang, Xiong Qi, and Han Yi A survey of low-rate denial-of-service attacks[J] Journal of Frontiers of Computer Science and Technology 2 1 2008 1 19 [in Chinese]
-
(2008)
Journal of Frontiers of Computer Science and Technology
, vol.2
, Issue.1
, pp. 1-19
-
-
Yan-Xiang, H.1
Tao, L.2
Qiang, C.3
Qi, X.4
Yi, H.5
-
23
-
-
52349085837
-
Detection of LDDoS attack based on Kalman filtering
-
Wu Zhi-Jun, and Yue Meng Detection of LDDoS attack based on Kalman filtering Acta Electronica Sinica 36 8 2008 1590 1594
-
(2008)
Acta Electronica Sinica
, vol.36
, Issue.8
, pp. 1590-1594
-
-
Zhi-Jun, W.1
Meng, Y.2
|