메뉴 건너뛰기




Volumn 31, Issue 4, 2012, Pages 402-417

MSABMS-based approach of detecting LDoS attack

Author keywords

Detection; Eigenvalue; Estimation; Low rate Denial of Service (LDoS); Multiple Sampling Averaging Based on Missing Sampling (MSABMS); Period; Small signal

Indexed keywords

DENIAL OF SERVICE; EIGEN-VALUE; MULTIPLE SAMPLING; PERIOD; SMALL SIGNAL;

EID: 84861098336     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.03.002     Document Type: Article
Times cited : (24)

References (25)
  • 3
  • 4
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
    • DOI 10.1016/j.jpdc.2006.04.007, PII S0743731506000852
    • Yu Chen, and Kai Hwang Collaborative detection and filtering of shrew DDoS attacks using spectral analysis Journal of Parallel and Distributed Computing, special issue on Security in Grids and Distributed Systems 66 9 2006 1137 1151 (Pubitemid 44205394)
    • (2006) Journal of Parallel and Distributed Computing , vol.66 , Issue.9 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 5
    • 77951971316 scopus 로고    scopus 로고
    • Collaborative defense against periodic shrew DDoS attacks in frequency domain[C]
    • ACM Los Angeles, California, USA
    • Yu Chen, KaiI Hwang, and Kwok Yu-Kwong Collaborative defense against periodic shrew DDoS attacks in frequency domain[C] ACM transactions on information and system security (TISSEC) 2005 ACM Los Angeles, California, USA 2 27
    • (2005) ACM Transactions on Information and System Security (TISSEC) , pp. 2-27
    • Chen, Y.1    Hwang, K.2    Yu-Kwong, K.3
  • 6
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks[C]
    • IEEE Taipei, China
    • C.M. Cheng, H. Kung, and K.S. Tan Use of spectral analysis in defense against DoS attacks[C] Proc. IEEE GLOBECOM 2002 IEEE Taipei, China 2143 2148
    • (2002) Proc. IEEE GLOBECOM , pp. 2143-2148
    • Cheng, C.M.1    Kung, H.2    Tan, K.S.3
  • 9
    • 74249088444 scopus 로고    scopus 로고
    • Survey of network security systems to counter SIP-based denial-of-service attacks
    • Elsevier
    • S. Ehlert, D. Geneiatakis, and T. Magendaz Survey of network security systems to counter SIP-based denial-of-service attacks Computer & Security 29 2 2010 225 243 Elsevier
    • (2010) Computer & Security , vol.29 , Issue.2 , pp. 225-243
    • Ehlert, S.1    Geneiatakis, D.2    Magendaz, T.3
  • 10
    • 70349440967 scopus 로고    scopus 로고
    • Utilizing bloom filters for detecting flooding attacks against SIP based services
    • Elsevier
    • D. Geneiatakis, N. Vrakas, and C. Lambrinoudakis Utilizing bloom filters for detecting flooding attacks against SIP based services Computer & Security 28 2009 578 591 Elsevier
    • (2009) Computer & Security , vol.28 , pp. 578-591
    • Geneiatakis, D.1    Vrakas, N.2    Lambrinoudakis, C.3
  • 11
    • 79960610298 scopus 로고
    • Detection and tracking weak periodic signal[J]
    • [in Chinese]
    • Zhang Guo-jie Detection and tracking weak periodic signal[J] Journal of Data Acquisition & Processing 6 1 1991 16 22 [in Chinese]
    • (1991) Journal of Data Acquisition & Processing , vol.6 , Issue.1 , pp. 16-22
    • Guo-Jie, Z.1
  • 12
    • 0003254064 scopus 로고    scopus 로고
    • A non-intrusive, wavelet-based approach to detecting network performance problems[C]
    • ACM San Francisco, CA, USA
    • P. Huang, A. Feldmann, and W. Willinger A non-intrusive, wavelet-based approach to detecting network performance problems[C] Proc. ACM SIGCOMM Internet measurement workshop 2001 ACM San Francisco, CA, USA 1 2
    • (2001) Proc. ACM SIGCOMM Internet Measurement Workshop , pp. 1-2
    • Huang, P.1    Feldmann, A.2    Willinger, W.3
  • 13
    • 84861095986 scopus 로고    scopus 로고
    • Reliable anomaly detecting system against low-rate DDoS attack[J]
    • [in Chinese]
    • Tian Kai-lin, and Li Ming Reliable anomaly detecting system against low-rate DDoS attack[J] Modern Electronic Technique 32 7 2009 68 70 [in Chinese]
    • (2009) Modern Electronic Technique , vol.32 , Issue.7 , pp. 68-70
    • Kai-Lin, T.1    Ming, L.2
  • 14
    • 59649106635 scopus 로고    scopus 로고
    • On remote exploitation of TCP sender for low-rate flooding denial-of-service attack
    • V. Kumar, P. Jayalekshmy, G. Patra, and R. Thangavelu On remote exploitation of TCP sender for low-rate flooding denial-of-service attack IEEE Communications Letters 13 1 2009 46 48
    • (2009) IEEE Communications Letters , vol.13 , Issue.1 , pp. 46-48
    • Kumar, V.1    Jayalekshmy, P.2    Patra, G.3    Thangavelu, R.4
  • 15
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks - The shrew vs the mice and elephants[C]
    • ACM Karlsruhe, Germany
    • A. Kuzmanovic, and E.W. Knightly Low-rate TCP-targeted denial of service attacks-the shrew vs the mice and elephants[C] Proc. ACM SIGCOMM 2003 2003 ACM Karlsruhe, Germany 75 86
    • (2003) Proc. ACM SIGCOMM 2003 , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 16
    • 33744524845 scopus 로고    scopus 로고
    • Low-rate TCP-targeted denial of service attacks and counter strategies
    • DOI 10.1109/TNET.2006.880180
    • Aleksandar Kuzmanovic, and Edward W. Knightly Low-rate TCP-targeted denial of service attacks and counter strategies [J] IEEE/ACM Transactions on Networking 14 4 2006 683 696 (Pubitemid 46405435)
    • (2006) IEEE/ACM Transactions on Networking , vol.14 , Issue.4 , pp. 683-696
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 18
    • 0024627949 scopus 로고
    • The second-order moments of the sample covariances for time series with missing observations
    • Y. Rosen, and B. Porat The second-order moments of the sample covariances for time series with missing observations IEEE Transactions on Information Theory 35 2 1989 334 341
    • (1989) IEEE Transactions on Information Theory , vol.35 , Issue.2 , pp. 334-341
    • Rosen, Y.1    Porat, B.2
  • 19
    • 79957530146 scopus 로고    scopus 로고
    • Low-rate DDoS attacks detection and traceback by using new information metrics
    • Yang Xiang, Ke Li, and Wanlei Zhou Low-rate DDoS attacks detection and traceback by using new information metrics IEEE Transactions on Information Forensics and Security 6 2 2011 426 437
    • (2011) IEEE Transactions on Information Forensics and Security , vol.6 , Issue.2 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 20
    • 65349165972 scopus 로고    scopus 로고
    • A low-rate DoS detection method based on feature extraction using wavelet transform[J]
    • He Yan-Xiang, Cao Qiang, Liu Tao, Han Yi, and Xiong Qi A low-rate DoS detection method based on feature extraction using wavelet transform[J] Journal of Software 20 4 2009 930 941
    • (2009) Journal of Software , vol.20 , Issue.4 , pp. 930-941
    • Yan-Xiang, H.1    Qiang, C.2    Tao, L.3    Yi, H.4    Qi, X.5
  • 23
    • 52349085837 scopus 로고    scopus 로고
    • Detection of LDDoS attack based on Kalman filtering
    • Wu Zhi-Jun, and Yue Meng Detection of LDDoS attack based on Kalman filtering Acta Electronica Sinica 36 8 2008 1590 1594
    • (2008) Acta Electronica Sinica , vol.36 , Issue.8 , pp. 1590-1594
    • Zhi-Jun, W.1    Meng, Y.2
  • 24


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.