메뉴 건너뛰기




Volumn , Issue , 2011, Pages

DDoS flooding attack detection through a step-by-step investigation

Author keywords

DDoS Detection; DDoS Flooding attack; Distributed Denial of Service; Entropy; Quaily of Service

Indexed keywords

COMMUNICATION RESOURCES; DDOS ATTACK; DDOS DETECTION; DDOS FLOODING ATTACK; DETECTION MECHANISM; DETECTION METHODS; DISTRIBUTED DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE ATTACK; FLOODING ATTACKS; INTERNET USERS; INTRUSION DETECTION SYSTEMS; LARGE NETWORKS; NETWORK ATTACK; OPNET SIMULATION; QUAILY-OF-SERVICE; REAL-TIME DETECTION; STEP-BY-STEP;

EID: 84863260902     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NESEA.2011.6144944     Document Type: Conference Paper
Times cited : (19)

References (13)
  • 1
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • Feb
    • Yi Xie and Shun-Zheng Yu. "Monitoring the Application-Layer DDoS Attacks for Popular websites," IEEE/ACM Trans on Networking, Vol.17, No.1, pp.15-25, Feb 2009.
    • (2009) IEEE/ACM Trans on Networking , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2
  • 2
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attack rip the internet
    • April
    • Lee Garber, "Denial-of-Service Attack Rip the Internet", ACM Computer, Vol.33, Iss.4, pp.12-17, April 2000.
    • (2000) ACM Computer, Vol.33, Iss.4 , pp. 12-17
    • Garber, L.1
  • 3
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Article 3, April
    • Peng, T, Leckie, C, and Ramamohanarao. K,"Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems", ACM Computing Surveys, vol.39, Iss.1, Article 3, April 2007.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 4
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • Apr
    • Jelena Mirkovic and Perter Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communications Review, Vol.34, No.2, pp.39-53, Apr 2004.
    • (2004) ACM SIGCOMM Computer Communications Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 5
    • 67649458219 scopus 로고    scopus 로고
    • Application classification using packet size distribution and port association
    • Sep
    • Ying-Dar Lin, Chun-Nan Lu, Yuan-Cheng Lai, Wei-Hao Peng and Po-Ching Lin, "Application classification using packet size distribution and port association," ScienceDirect, Vol.32, Iss.5, pp.1023-1030, Sep 2009.
    • (2009) Science Direct , vol.32 , Issue.5 , pp. 1023-1030
    • Lin, Y.-D.1    Lu, C.-N.2    Lai, Y.-C.3    Peng, W.-H.4    Lin, P.-C.5
  • 6
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of DDoS attacks over multiple network domains
    • Dec
    • Yu Chen, Kai Hwang and Wei-Shinn Ku. "Collaborative Detection of DDoS Attacks over Multiple Network Domains", Parallel and Distributed Systems, IEEE Transactions on, Vol.18, Iss.12, pp.1649-1662, Dec 2007.
    • (2007) Parallel and Distributed Systems, IEEE Transactions on , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 7
    • 33749824252 scopus 로고    scopus 로고
    • ALPI: A DDoS defense system for high-speed networks
    • Oct
    • Paulo E Ayres, Huizhong Sun, H. Jonathan Chao and Wing Cheong Lau, "ALPI: A DDoS Defense System for High-Speed Networks," IEEE Journal, Vol.24, Iss.10, pp.1864-1876, Oct 2006.
    • (2006) IEEE Journal , vol.24 , Issue.10 , pp. 1864-1876
    • Ayres, P.E.1    Sun, H.2    Chao, H.J.3    Lau, W.C.4
  • 8
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Oct
    • Anukool Lakhina, Mark Crovella and Christophe Diot, "Mining anomalies using traffic feature distributions," ACM SIGCOMM, Vol.35, Iss.4, pp.217-228, Oct 2005.
    • (2005) ACM SIGCOMM , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 9
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problem
    • Article 3, Mar
    • Tao Peng, Christopher Leckie and Kotagiri Ramamohanarao. "Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problem," ACM Computing Surveys, Vol.39, Iss.1, Article 3, Mar 2007.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 11
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-count filtering
    • Feb
    • Haining Wand, Chen Jin and Kang G. Shin. "Defense Against Spoofed IP Traffic Using Hop-Count Filtering," Networking, IEEE/ACM Transaction on, Vol.15, Iss.2, pp.40-53, Feb 2007.
    • (2007) Networking, IEEE/ACM Transaction on , vol.15 , Issue.2 , pp. 40-53
    • Wand, H.1    Jin, C.2    Shin, K.G.3
  • 12
    • 44649105615 scopus 로고    scopus 로고
    • Unsupervised feature selection using clustering ensembles and population based incremental learning algorithm
    • Sep
    • Yi Hong, Sam Kwong, Yuchou Chang and Qingsheng, Ren, "Unsupervised feature selection using clustering ensembles and population based incremental learning algorithm," ScienceDirect, Vol.41, Iss.9, pp.2742-2756, Sep 2008
    • (2008) Science Direct , vol.41 , Issue.9 , pp. 2742-2756
    • Hong, Y.1    Kwong, S.2    Chang, Y.3    Ren, Q.4
  • 13
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic behavior models and applications
    • Oct.
    • Kuai, X. Zhi, Z. Supratik, B. "Profiling Internet Backbone Traffic Behavior Models and Applications," ACM SIGCOMM, Vol.35, No.4, pp.169-180, Oct. 2005.
    • (2005) ACM SIGCOMM , vol.35 , Issue.4 , pp. 169-180
    • Kuai, X.1    Zhi, Z.2    Supratik, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.