-
1
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Feb
-
Yi Xie and Shun-Zheng Yu. "Monitoring the Application-Layer DDoS Attacks for Popular websites," IEEE/ACM Trans on Networking, Vol.17, No.1, pp.15-25, Feb 2009.
-
(2009)
IEEE/ACM Trans on Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
2
-
-
0002000920
-
Denial-of-service attack rip the internet
-
April
-
Lee Garber, "Denial-of-Service Attack Rip the Internet", ACM Computer, Vol.33, Iss.4, pp.12-17, April 2000.
-
(2000)
ACM Computer, Vol.33, Iss.4
, pp. 12-17
-
-
Garber, L.1
-
3
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
Article 3, April
-
Peng, T, Leckie, C, and Ramamohanarao. K,"Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problems", ACM Computing Surveys, vol.39, Iss.1, Article 3, April 2007.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
4
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS defense mechanisms
-
Apr
-
Jelena Mirkovic and Perter Reiher, "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms," ACM SIGCOMM Computer Communications Review, Vol.34, No.2, pp.39-53, Apr 2004.
-
(2004)
ACM SIGCOMM Computer Communications Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
5
-
-
67649458219
-
Application classification using packet size distribution and port association
-
Sep
-
Ying-Dar Lin, Chun-Nan Lu, Yuan-Cheng Lai, Wei-Hao Peng and Po-Ching Lin, "Application classification using packet size distribution and port association," ScienceDirect, Vol.32, Iss.5, pp.1023-1030, Sep 2009.
-
(2009)
Science Direct
, vol.32
, Issue.5
, pp. 1023-1030
-
-
Lin, Y.-D.1
Lu, C.-N.2
Lai, Y.-C.3
Peng, W.-H.4
Lin, P.-C.5
-
6
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
Dec
-
Yu Chen, Kai Hwang and Wei-Shinn Ku. "Collaborative Detection of DDoS Attacks over Multiple Network Domains", Parallel and Distributed Systems, IEEE Transactions on, Vol.18, Iss.12, pp.1649-1662, Dec 2007.
-
(2007)
Parallel and Distributed Systems, IEEE Transactions on
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
7
-
-
33749824252
-
ALPI: A DDoS defense system for high-speed networks
-
Oct
-
Paulo E Ayres, Huizhong Sun, H. Jonathan Chao and Wing Cheong Lau, "ALPI: A DDoS Defense System for High-Speed Networks," IEEE Journal, Vol.24, Iss.10, pp.1864-1876, Oct 2006.
-
(2006)
IEEE Journal
, vol.24
, Issue.10
, pp. 1864-1876
-
-
Ayres, P.E.1
Sun, H.2
Chao, H.J.3
Lau, W.C.4
-
8
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
Oct
-
Anukool Lakhina, Mark Crovella and Christophe Diot, "Mining anomalies using traffic feature distributions," ACM SIGCOMM, Vol.35, Iss.4, pp.217-228, Oct 2005.
-
(2005)
ACM SIGCOMM
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problem
-
Article 3, Mar
-
Tao Peng, Christopher Leckie and Kotagiri Ramamohanarao. "Survey of Network-based Defense Mechanisms Countering the DoS and DDoS Problem," ACM Computing Surveys, Vol.39, Iss.1, Article 3, Mar 2007.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
11
-
-
33947503628
-
Defense against spoofed IP traffic using hop-count filtering
-
Feb
-
Haining Wand, Chen Jin and Kang G. Shin. "Defense Against Spoofed IP Traffic Using Hop-Count Filtering," Networking, IEEE/ACM Transaction on, Vol.15, Iss.2, pp.40-53, Feb 2007.
-
(2007)
Networking, IEEE/ACM Transaction on
, vol.15
, Issue.2
, pp. 40-53
-
-
Wand, H.1
Jin, C.2
Shin, K.G.3
-
12
-
-
44649105615
-
Unsupervised feature selection using clustering ensembles and population based incremental learning algorithm
-
Sep
-
Yi Hong, Sam Kwong, Yuchou Chang and Qingsheng, Ren, "Unsupervised feature selection using clustering ensembles and population based incremental learning algorithm," ScienceDirect, Vol.41, Iss.9, pp.2742-2756, Sep 2008
-
(2008)
Science Direct
, vol.41
, Issue.9
, pp. 2742-2756
-
-
Hong, Y.1
Kwong, S.2
Chang, Y.3
Ren, Q.4
-
13
-
-
33750711125
-
Profiling internet backbone traffic behavior models and applications
-
Oct.
-
Kuai, X. Zhi, Z. Supratik, B. "Profiling Internet Backbone Traffic Behavior Models and Applications," ACM SIGCOMM, Vol.35, No.4, pp.169-180, Oct. 2005.
-
(2005)
ACM SIGCOMM
, vol.35
, Issue.4
, pp. 169-180
-
-
Kuai, X.1
Zhi, Z.2
Supratik, B.3
|