메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2851-2855

Can we beat legitimate cyber behavior mimicking attacks from botnets?

Author keywords

botnet; detection; flash crowd attack; mimicking attack

Indexed keywords

BOTNET; BOTNETS; CYBER BEHAVIORS; CYBERSPACES; FLASH CROWD; ILLEGAL ACTIONS; LEGITIMATE USERS; MALICIOUS ACTIVITIES; MIMICKING ATTACK;

EID: 84861634583     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2012.6195714     Document Type: Conference Paper
Times cited : (41)

References (29)
  • 2
    • 77955872093 scopus 로고    scopus 로고
    • On anonymity in an electronic society: A survey of anonymous communication systems
    • M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Computing Survey, vol. 42, no. 1, 2009.
    • (2009) ACM Computing Survey , vol.42 , Issue.1
    • Edman, M.1    Yener, B.2
  • 5
    • 84857360605 scopus 로고    scopus 로고
    • Abnormally malicious autonomous systems and their internet connectivity
    • in press
    • C. Shue, A. Kalafut, and M. Gupta, "Abnormally malicious autonomous systems and their internet connectivity," IEEE Transactions on Networking (in press).
    • IEEE Transactions on Networking
    • Shue, C.1    Kalafut, A.2    Gupta, M.3
  • 9
    • 36249008514 scopus 로고    scopus 로고
    • A survey of bots used for distributed denial of service attacks
    • V. L. L. Thing, M. Sloman, and N. Dulay, "A survey of bots used for distributed denial of service attacks," in SEC, 2007, pp. 229-240.
    • (2007) SEC , pp. 229-240
    • Thing, V.L.L.1    Sloman, M.2    Dulay, N.3
  • 12
    • 58149490850 scopus 로고    scopus 로고
    • Information theory based detection against network behavior mimicking ddos attack
    • S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking ddos attack," IEEE Communications Letters, vol. 12, no. 4, pp. 319-321, 2008.
    • (2008) IEEE Communications Letters , vol.12 , Issue.4 , pp. 319-321
    • Yu, S.1    Zhou, W.2    Doss, R.3
  • 15
    • 33746985496 scopus 로고    scopus 로고
    • Collaborative detection and filtering of shrew ddos attacks using spectral analysis
    • Y. Chen and K. Hwang, "Collaborative detection and filtering of shrew ddos attacks using spectral analysis," Journal of Parallel Distributed Computing, vol. 66, no. 9, pp. 1137-1151, 2006.
    • (2006) Journal of Parallel Distributed Computing , vol.66 , Issue.9 , pp. 1137-1151
    • Chen, Y.1    Hwang, K.2
  • 16
    • 84924375780 scopus 로고    scopus 로고
    • Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds (awarded best student paper)
    • S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds (awarded best student paper)," in NSDI, 2005.
    • (2005) NSDI
    • Kandula, S.1    Katabi, D.2    Jacob, M.3    Berger, A.4
  • 17
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
    • Y. Xie and S.-Z. Yu, "A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 54-65, 2009.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.-Z.2
  • 20
    • 33947425424 scopus 로고    scopus 로고
    • Citations and the zipf-mandelbrot's law
    • Z. K. Silagadze, "Citations and the zipf-mandelbrot's law," Complex Systems, vol. 11, pp. 487-499, 1997.
    • (1997) Complex Systems , vol.11 , pp. 487-499
    • Silagadze, Z.K.1
  • 21
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: Evidence and possible causes
    • M. E. Crovella and A. Bestavros, "Self-similarity in world wide web traffic: evidence and possible causes," IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 835-846, 1997.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2
  • 23
    • 84861611630 scopus 로고    scopus 로고
    • WorldCup98, http://ita.ee.lbl.gov/html/contrib/WorldCup.html.
    • WorldCup98
  • 25
    • 39049125624 scopus 로고    scopus 로고
    • Controlling ip spoofing through interdomain packet filters
    • Z. Duan, X. Yuan, and J. Chandrashekar, "Controlling ip spoofing through interdomain packet filters," IEEE Trans. Dependable Sec. Comput., vol. 5, no. 1, pp. 22-36, 2008.
    • (2008) IEEE Trans. Dependable Sec. Comput. , vol.5 , Issue.1 , pp. 22-36
    • Duan, Z.1    Yuan, X.2    Chandrashekar, J.3
  • 26
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed ip traffic using hop-count filtering
    • H. Wang, C. Jin, and K. G. Shin, "Defense against spoofed ip traffic using hop-count filtering," IEEE/ACM Trans. Netw., vol. 15, no. 1, pp. 40-53, 2007.
    • (2007) IEEE/ACM Trans. Netw. , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 27
    • 33646742035 scopus 로고    scopus 로고
    • Packetscore: A statistics-based packet filtering scheme against distributed denial-ofservice attacks
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "Packetscore: A statistics-based packet filtering scheme against distributed denial-ofservice attacks," IEEE Trans. Dependable Sec. Comput., vol. 3, no. 2, pp. 141-155, 2006.
    • (2006) IEEE Trans. Dependable Sec. Comput. , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.