메뉴 건너뛰기




Volumn 31, Issue 6, 2012, Pages 782-790

Real time DDoS detection using fuzzy estimators

Author keywords

cuts; Anomaly based intrusion detection; Distributed denial of service attacks; Fuzzy estimators; Poisson arrival

Indexed keywords

ANOMALY-BASED INTRUSION DETECTION; DDOS DETECTION; DETECTION WINDOWS; DISTRIBUTED DENIAL OF SERVICE ATTACK; EMPIRICAL EVALUATIONS; FUZZY ESTIMATORS; INTER-ARRIVAL TIME; IP ADDRESSS; POISSON ARRIVAL; REAL TIME; REAL TIME CONSTRAINTS; STATISTICAL DESCRIPTORS;

EID: 84865258778     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.06.002     Document Type: Article
Times cited : (87)

References (42)
  • 2
    • 0031250567 scopus 로고    scopus 로고
    • Internet Web servers: Workload characterization and performance implications
    • M. Arlitt, and C. Williamson Internet Web servers: workload characterization and performance implications IEEE/ACM Transactions on Networking 5 5 1997 631 645
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.5 , pp. 631-645
    • Arlitt, M.1    Williamson, C.2
  • 3
    • 79957736179 scopus 로고    scopus 로고
    • Distributed denial of service attack detection using an ensemble of neural classifier
    • P. Arun Raj Kumar, and S. Selvakumar Distributed denial of service attack detection using an ensemble of neural classifier Computer Communications 34 11 2011 1328 1341
    • (2011) Computer Communications , vol.34 , Issue.11 , pp. 1328-1341
    • Arun Raj Kumar, P.1    Selvakumar, S.2
  • 5
    • 70449567512 scopus 로고    scopus 로고
    • Cost-volume-profit analysis under uncertainty: A model with fuzzy estimators based on confidence intervals
    • K.A. Chrysafis, and B.K. Papadopoulos Cost-volume-profit analysis under uncertainty: a model with fuzzy estimators based on confidence intervals International Journal of Production Research 47 21 2009
    • (2009) International Journal of Production Research , vol.47 , Issue.21
    • Chrysafis, K.A.1    Papadopoulos, B.K.2
  • 6
    • 1242321281 scopus 로고    scopus 로고
    • DDoS attacks and defense mechanisms: Classification and state-of-the-art
    • C. Douligeris, and A. Mitrokotsa DDoS attacks and defense mechanisms: classification and state-of-the-art Computer Networks 44 5 2004 643 666
    • (2004) Computer Networks , vol.44 , Issue.5 , pp. 643-666
    • Douligeris, C.1    Mitrokotsa, A.2
  • 8
    • 16644393989 scopus 로고    scopus 로고
    • Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features
    • D. Gavrilis, and E. Dermatas Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features Computer Networks 48 2 2005 235 245
    • (2005) Computer Networks , vol.48 , Issue.2 , pp. 235-245
    • Gavrilis, D.1    Dermatas, E.2
  • 12
    • 66549110064 scopus 로고    scopus 로고
    • Cyberwar in Estonia and the middle east
    • A. Jenik Cyberwar in Estonia and the Middle East Network Security 2009 4 2009 4 6
    • (2009) Network Security , vol.2009 , Issue.4 , pp. 4-6
    • Jenik, A.1
  • 14
    • 34248169333 scopus 로고    scopus 로고
    • Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
    • V. Katos Network intrusion detection: evaluating cluster, discriminant, and logit analysis Information Sciences 177 15 2007 3060 3073
    • (2007) Information Sciences , vol.177 , Issue.15 , pp. 3060-3073
    • Katos, V.1
  • 16
    • 33646899894 scopus 로고    scopus 로고
    • Real-time analysis of intrusion detection alerts via correlation
    • S. Lee, B. Chung, H. Kim, Y. Lee, C. Park, and H. Yoon Real-time analysis of intrusion detection alerts via correlation Computers & Security 25 3 2006 169 183
    • (2006) Computers & Security , vol.25 , Issue.3 , pp. 169-183
    • Lee, S.1    Chung, B.2    Kim, H.3    Lee, Y.4    Park, C.5    Yoon, H.6
  • 20
    • 51349102242 scopus 로고    scopus 로고
    • Inside the new coolstreaming: Principles, measurements and performance implications
    • B. Li, S. Xie, Y. Qu, G. Keung, D. Lin, and J. Liu Inside the new coolstreaming: principles, measurements and performance implications IEEE Infocom 2008
    • (2008) IEEE Infocom
    • Li, B.1    Xie, S.2    Qu, Y.3    Keung, G.4    Lin, D.5    Liu, J.6
  • 21
    • 8344244591 scopus 로고    scopus 로고
    • An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition
    • M. Li An approach to reliably identifying signs of DDoS flood attacks based on LRD traffic pattern recognition Computers and Security 23 7 2004 549 558
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 549-558
    • Li, M.1
  • 22
    • 55049131898 scopus 로고    scopus 로고
    • A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms
    • Y. Li, L. Guo, Z. Tian, and T. Lu A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms Computer Communications 31 2008 4018 4025
    • (2008) Computer Communications , vol.31 , pp. 4018-4025
    • Li, Y.1    Guo, L.2    Tian, Z.3    Lu, T.4
  • 25
    • 79952085525 scopus 로고    scopus 로고
    • DDoS detection technique using statistical analysis to generate Quick response time, International Conference on Broadband
    • S. Oshima, T. Nakashima, and T. Sueyoshi DDoS detection technique using statistical analysis to generate Quick response time, International Conference on Broadband Wireless Computing, Communication and Applications 2010 672 677
    • (2010) Wireless Computing, Communication and Applications , pp. 672-677
    • Oshima, S.1    Nakashima, T.2    Sueyoshi, T.3
  • 27
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 12 2007 3448 3470
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 28
    • 0029323403 scopus 로고
    • Wide area traffic: The failure of Poisson modeling
    • V. Paxson, and S. Floyd Wide area traffic: the failure of Poisson modeling IEEE/ACM Trans. on Networking 3 3 1995 226 244
    • (1995) IEEE/ACM Trans. on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 30
    • 24144485773 scopus 로고    scopus 로고
    • On-line segmentation of non-stationary fractal network traffic with wavelet transforms and Log-likelihood-based statistics
    • D. Rincón, and S. Sallent On-line segmentation of non-stationary fractal network traffic with wavelet transforms and Log-likelihood-based statistics Lecture Notes in Computer Science 3375 2005 110 123
    • (2005) Lecture Notes in Computer Science , vol.3375 , pp. 110-123
    • Rincón, D.1    Sallent, S.2
  • 32
    • 84865276449 scopus 로고    scopus 로고
    • A study of a botnet creation process and the impact of a DDoS attack against a web server
    • S.N. Shaeles, and I.D. Psaroudakis A study of a botnet creation process and the impact of a DDoS attack against a web server Hakin9 Extra - Botnets 2011 8 12 issue 5
    • (2011) Hakin9 Extra - Botnets , pp. 8-12
    • Shaeles, S.N.1    Psaroudakis, I.D.2
  • 37
    • 48249144409 scopus 로고    scopus 로고
    • An intelligent method for real-time detection of DDoS attack based on fuzzy logic
    • J. Wang, and G. Yang An intelligent method for real-time detection of DDoS attack based on fuzzy logic Journal of Electronics (China) 25 4 2008 511 518
    • (2008) Journal of Electronics (China) , vol.25 , Issue.4 , pp. 511-518
    • Wang, J.1    Yang, G.2
  • 39
    • 33746639174 scopus 로고    scopus 로고
    • Combining cross-correlation and fuzzy classification to detect distributed denial-of-service attacks
    • W. Wei, Y. Dong, D. Lu, and G. Jin Combining cross-correlation and fuzzy classification to detect distributed denial-of-service attacks Lecture Notes in Computer Science, LNCS 3994 2006 57 64
    • (2006) Lecture Notes in Computer Science, LNCS , vol.3994 , pp. 57-64
    • Wei, W.1    Dong, Y.2    Lu, D.3    Jin, G.4
  • 40
    • 78650122734 scopus 로고    scopus 로고
    • Enhancing DDoS flood attack detection via intelligent fuzzy logic
    • Z. Xia, S. Lu, and J. Li Enhancing DDoS flood attack detection via intelligent fuzzy logic Informatica 34 2010 497 507
    • (2010) Informatica , vol.34 , pp. 497-507
    • Xia, Z.1    Lu, S.2    Li, J.3
  • 42
    • 58149490850 scopus 로고    scopus 로고
    • Information theory based detection against network behavior mimicking DDoS attacks
    • S. Yu, W. Zhou, and R. Doss Information theory based detection against network behavior mimicking DDoS attacks IEEE Communications Letters 12 4 2008 318 324
    • (2008) IEEE Communications Letters , vol.12 , Issue.4 , pp. 318-324
    • Yu, S.1    Zhou, W.2    Doss, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.