-
1
-
-
34147099073
-
Survey of network- based defense mechanisms countering the DoS and DDoS problems
-
T. Peng, C. Leckie, and K. Ramamohanarao Survey of network- based defense mechanisms countering the DoS and DDoS problems ACM Computing Surveys 39 1 2007 1 42
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
, pp. 1-42
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
2
-
-
25844458510
-
Reduction of Quality (RoQ) attacks on Internet end-systems
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
M. Guirguis, A. Bestavros, I. Matta, and Y. Zhang Reduction of quality (RoQ) attacks on internet end systems Proceedings of IEEE INFOCOM 2 March 2005 1362 1372 (Pubitemid 41390787)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.2
, pp. 1362-1372
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
Zhang, Y.4
-
3
-
-
38549119585
-
Spectral analysis of TCP flows for defense against reduction-of-quality attacks
-
DOI 10.1109/ICC.2007.204, 4288875, 2007 IEEE International Conference on Communications, ICC'07
-
Y. Chen, K. Hwang, Spectral Analysis of TCP flows for defense against reduction-of-quality attacks, in: The 2007 IEEE International Conference on Communications (ICC'07), June 2007, pp. 1203-1210. (Pubitemid 351145701)
-
(2007)
IEEE International Conference on Communications
, pp. 1203-1210
-
-
Chen, Y.1
Hwang, K.2
-
4
-
-
33845584261
-
Collaborative change detection of DDoS attacks on community and ISP networks
-
DOI 10.1109/CTS.2006.27, 1644164, Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, CTS 2006
-
Y. Chen, K. Hwang, Collaborative change detection of DDoS attacks on community and ISP networks", in: The IEEE International Symposium on Collaborative Technologies and Systems (CTS 2006), May 2006, pp. 401-410. (Pubitemid 44930984)
-
(2006)
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, CTS 2006
, vol.2006
, pp. 401-410
-
-
Chen, Y.1
Hwang, K.2
-
5
-
-
67649871082
-
Detecting VoIP-specific denial-of-service using change-point method
-
on Feb 2009
-
Hongli Zhang, Zhimin Gu, Caixia Liu, Tang Jie, Detecting VoIP-specific denial-of-service using change-point method, in: 11th International Conf. on Feb. 2009, pp. 1059-1064.
-
11th International Conf
, pp. 1059-1064
-
-
Zhang, H.1
Gu, Z.2
Liu, C.3
Jie, T.4
-
6
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
IEEE CS Press, Washington, DC, USA, 22-24 April
-
L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred, Statistical approaches to DDoS attack detection and response, in: Proceedings of DARPA Information Survivability Conf. and Exposition, vol. 1, IEEE CS Press, Washington, DC, USA, 22-24 April 2003, pp. 303-314.
-
(2003)
Proceedings of DARPA Information Survivability Conf. and Exposition
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
7
-
-
85084161486
-
Inferring internet denial of- service activity
-
USENIX Association, August
-
D. Moore, G.M. Voelker, S. Savage, Inferring internet denial of- service activity, in: Proceedings of 2001 USENIX Security Symposium, vol. 10, USENIX Association, August 2001, pp. 115-139.
-
(2001)
Proceedings of 2001 USENIX Security Symposium
, vol.10
, pp. 115-139
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
8
-
-
72849125444
-
Discriminating DDoS flows from flash crowds using information distance
-
IEEE, Piscataway, N. J., 2009
-
Yu, Shui, Thapngam, Theerasak, Liu, Jianwen, Wei, Su and Zhou, Wanlei 2009, "Discriminating DDoS flows from flash crowds using information distance", Proc. of the third International Conf. on Network and System Security, IEEE, Piscataway, N. J., 2009, pp. 351-356.
-
(2009)
Proc. of the Third International Conf. on Network and System Security
, pp. 351-356
-
-
Yu1
Shui2
Thapngam3
Theerasak4
Liu5
Jianwen6
Wei7
Su8
Zhou9
Wanlei10
-
9
-
-
35148840623
-
Detecting denial-of-service attacks using the wavelet transform
-
Mohamed. Hamdi, and Noureddine. Boudriga Detecting denial-of-service attacks using the wavelet transform Computer Communications 30 16 2007 3203 3213
-
(2007)
Computer Communications
, vol.30
, Issue.16
, pp. 3203-3213
-
-
Hamdi, M.1
Boudriga, N.2
-
10
-
-
33751110003
-
Wavelet based Denial-of-Service detection
-
DOI 10.1016/j.cose.2006.08.017, PII S0167404806001210
-
G. Carl, R.R. Brooks, and S. Rai Wavelet based denial-of-service detection Computers and Security 25 8 2006 600 615 (Pubitemid 44765088)
-
(2006)
Computers and Security
, vol.25
, Issue.8
, pp. 600-615
-
-
Carl, G.1
Brooks, R.R.2
Rai, S.3
-
11
-
-
39049125624
-
Controlling IP spoofing through interdomain packet filters
-
DOI 10.1109/TDSC.2007.70224
-
Z. Duan, X. Yuan, J. Chandrashekar, Controlling IP Spoofing through Inter domain Packet Filters, in: IEEE Trans. on Dependable and Secure, Computing, 5(1), January-March 2008, pp. 22-36. (Pubitemid 351239530)
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.1
, pp. 22-36
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
12
-
-
72849110028
-
Source-based filtering algorithm against DDOS attacks
-
F. Yi, S. Yu, W. Zhou, J. Hai, and A. Bonti Source-based filtering algorithm against DDOS attacks International Journal of Database Theory and Application 1 1 December 2008 9 20
-
(2008)
International Journal of Database Theory and Application
, vol.1
, Issue.1
, pp. 9-20
-
-
Yi, F.1
Yu, S.2
Zhou, W.3
Hai, J.4
Bonti, A.5
-
13
-
-
33947503628
-
Defense against spoofed IP traffic using hop-count filtering
-
DOI 10.1109/TNET.2006.890133
-
H. Wang, C. Jin, K.G. Shin, Defense against spoofed IP traffic using hop-count filtering, in: IEEE/ACM Trans.s on Networking, vol. 15, No. 1, February 2007, pp. 40-53. (Pubitemid 46464416)
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
14
-
-
84862018875
-
-
online 26
-
Scott Fowler, Sherali Zeadally, Naveen Chilamkurti, Impact of denial of service solutions on network quality of service, security and communication networks article first published, online 26 JUL 2010, http://dx.doi.org/10.1002/ sec.219.
-
(2010)
Impact of Denial of Service Solutions on Network Quality of Service, Security and Communication Networks Article First Published
-
-
Fowler, S.1
Zeadally, S.2
Chilamkurti, N.3
-
15
-
-
31544436627
-
Denial-of-service attack detection techniques
-
G. Carl, G. Kesidis, R.R. Brooks, and S. Rai Denial-of-service attack detection techniques IEEE Internet Computing 10 1 2006 82 89
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
17
-
-
34548183355
-
A distributed approach using entropy to detect DDoS attacks in ISP domain
-
DOI 10.1109/ICSCN.2007.350758, 4156640, Proceedings of ICSCN 2007: International Conference on Signal Processing Communications and Networking
-
Krishan Kumar, R.C. Joshil, Kuldip Singh, A Distributed Approach using Entropy to Detect DDoS Attacks, in: ISP Domain", IEEE-ICSCN 2007, MIT Campus, Anna University, Chennai, India, 2007, pp.331-337. (Pubitemid 47304132)
-
(2007)
Proceedings of ICSCN 2007: International Conference on Signal Processing Communications and Networking
, pp. 331-337
-
-
Kumar, K.1
Joshi, R.C.2
Singh, K.3
-
19
-
-
33646878980
-
Detecting distributed denial-of-service attacks using kolmogorov complexity gauges
-
Amit. Kulkarni, and Stephen. Bush Detecting distributed denial-of-service attacks using kolmogorov complexity gauges Journal of Network and Systems Management 14 1 March 2006 69 80
-
(2006)
Journal of Network and Systems Management
, vol.14
, Issue.1
, pp. 69-80
-
-
Kulkarni, A.1
Bush, S.2
-
21
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
DOI 10.1016/j.jpdc.2006.04.007, PII S0743731506000852
-
Y. Chen, and K. Hwang Collaborative detection and filtering of shrew DDoS attacks using spectral analysis Journal of Parallel and Distributed Computing 66 9 2006 1137 1151 (Pubitemid 44205394)
-
(2006)
Journal of Parallel and Distributed Computing
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
22
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
C.M. Cheng, H.T. Kung, K.S. Tan, Use of spectral analysis in defense against DoS attacks", in: IEEE Global Communications Conference, 2002, pp. 2143-2148.
-
(2002)
IEEE Global Communications Conference
, pp. 2143-2148
-
-
Cheng, C.M.1
Kung, H.T.2
Tan, K.S.3
-
23
-
-
35549011836
-
Robust and efficient detection of DDoS attacks for large-scale internet
-
DOI 10.1016/j.comnet.2007.08.008, PII S1389128607002320
-
K. Lu, D. Wu, J. Fan, S. Todorovic, and A. Nucci Robust and efficient detection of DDoS attacks for large-scale internet Computer Networks 51 September 2007 5036 5056 (Pubitemid 350008118)
-
(2007)
Computer Networks
, vol.51
, Issue.18
, pp. 5036-5056
-
-
Lu, K.1
Wu, D.2
Fan, J.3
Todorovic, S.4
Nucci, A.5
-
24
-
-
58149490850
-
Information theory based detection against network behavior mimicking DDoS attack
-
S. Yu, W. Zhou, and R. Doss Information theory based detection against network behavior mimicking DDoS attack IEEE Communications Letters 12 4 April 2008 319 321
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.4
, pp. 319-321
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
-
25
-
-
44049088453
-
Detecting VoIP floods using the Hellinger Distance
-
No. 6, June 2008
-
H. Sengar, H. Wang, D. Wijesekera, S. Jajodia, Detecting VoIP floods using the Hellinger Distance, in: IEEE Transactions on Parallel and Distributed Systems, vol. 19, No. 6, June 2008. pp. 794-805.
-
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, pp. 794-805
-
-
Sengar, H.1
Wang, H.2
Wijesekera, D.3
Jajodia, S.4
-
26
-
-
84862005286
-
-
accessed November 05, 2010
-
http://tracer.csl.sony.co.jp/mawi/, accessed November 05, 2010.
-
-
-
-
27
-
-
84862019850
-
-
accessed November 05, 2010
-
http://www.lasr.cs.ucla.edu/ddos/traces/, accessed November 05, 2010.
-
-
-
-
28
-
-
84862006567
-
-
http://www.caida.org/data/passive/ddos-200708040-dataset.xml.
-
-
-
-
29
-
-
0024925404
-
Distance measures for signal processing and pattern recognition
-
DOI 10.1016/0165-1684(89)90079-0
-
M. Basseville Distance measures for signal processing and pattern recognition Signal Processing 18 4 1989 349 369 (Pubitemid 20636472)
-
(1989)
Signal Processing
, vol.18
, Issue.4
, pp. 349-369
-
-
Basseville Michele1
-
31
-
-
0141762478
-
A pragmatic definition of elephants in internet backbone traffic
-
ACM
-
H. Papagiannaki K., Taft N., Bhattacharyya S., Thiran P., Salamatian K., Diot C., A pragmatic definition of elephants in internet backbone traffic, in: Internet Measurement Workshop. ACM, 2002, pp. 175-176.
-
(2002)
Internet Measurement Workshop
, pp. 175-176
-
-
Papagiannaki, K.H.1
Taft, N.2
Bhattacharyya, S.3
Thiran, P.4
Salamatian, K.5
Diot, C.6
-
34
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
DOI 10.1109/TDSC.2005.35
-
J. Mirkovic, P. Reiher, D-WARD: a source-end defense against flooding denial-of-service attacks, in: IEEE Transactions on Dependable and Secure, Computing, 2(3), July-Sept. 2005, pp. 216-232. (Pubitemid 41560432)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
35
-
-
42149086458
-
Analysis of Internet backbone traf?c and header anomalies observed
-
New York, NY, USA
-
W. John, S. Tafvelin. Analysis of Internet backbone traf?c and header anomalies observed, in: IMC '07: Proceedings of the Seventh ACM SIGCOMM conference on Internet measurement, New York, NY, USA, pp. 111-116.
-
IMC '07: Proceedings of the Seventh ACM SIGCOMM Conference on Internet Measurement
, pp. 111-116
-
-
John, W.1
Tafvelin, S.2
-
37
-
-
70350492767
-
Analysis of UDP Traffic Usage on Internet Backbone Links
-
Seattle, USA, Jul
-
M. Zhang, M. Dusi, W. John, C. Chen. Analysis of UDP Traffic Usage on Internet Backbone Links, in: Proceedings of the Nineth Annual International Symposium on Applications and the Internet (SAINT 2009, Student Workshop), Seattle, USA, Jul. 2009.
-
(2009)
Proceedings of the Nineth Annual International Symposium on Applications and the Internet (SAINT 2009, Student Workshop)
-
-
Zhang, M.1
Dusi, M.2
John, W.3
Chen, C.4
|