-
1
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
Zhou CV, Leckie C, Karunasekera S. A survey of coordinated attacks and collaborative intrusion detection. Computers and Security 2010; 29:124-140.
-
(2010)
Computers and Security
, vol.29
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
2
-
-
77953234751
-
HiFIND: a high-speed flow-level intrusion detection approach with DoS resiliency
-
Li Z, Gao Y, Chen Y. HiFIND: a high-speed flow-level intrusion detection approach with DoS resiliency. Computer Networks 2010; 54:1282-1299.
-
(2010)
Computer Networks
, vol.54
, pp. 1282-1299
-
-
Li, Z.1
Gao, Y.2
Chen, Y.3
-
3
-
-
70449625471
-
-
Source detection of SYN flooding attacks. Proceedings of the 2009 International Conference on Network and Service Security (N2S 2009)
-
Bellaiche M, Gregoire J-C. Source detection of SYN flooding attacks. Proceedings of the 2009 International Conference on Network and Service Security (N2S 2009), 2009; 1-6.
-
(2009)
, pp. 1-6
-
-
Bellaiche, M.1
Gregoire, J.-C.2
-
4
-
-
58149102866
-
-
Detecting SYN flooding agents under any type of IP spoofing. Proceedings of IEEE International Conference on e-Business Engineering (ICEBE 200)
-
Nashat D, Xiaohong J, Horiguchi S. Detecting SYN flooding agents under any type of IP spoofing. Proceedings of IEEE International Conference on e-Business Engineering (ICEBE 200), 2008; 499-505.
-
(2008)
, pp. 499-505
-
-
Nashat, D.1
Xiaohong, J.2
Horiguchi, S.3
-
6
-
-
0036343692
-
-
Detecting SYN flooding attacks. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002)
-
Haining W, Danlu Z, Kang GS. Detecting SYN flooding attacks. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), 2002; 1530-1539.
-
(2002)
, pp. 1530-1539
-
-
Haining, W.1
Danlu, Z.2
Kang, G.S.3
-
7
-
-
33646423315
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Siris VA, Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications 2006; 29:1433-1442.
-
(2006)
Computer Communications
, vol.29
, pp. 1433-1442
-
-
Siris, V.A.1
Papagalou, F.2
-
8
-
-
84954358597
-
Traffic flooding attack detection with SNMP MIB using SVM
-
Yu J, Lee H, Kim M-S, Park D. Traffic flooding attack detection with SNMP MIB using SVM. Computer Communications 2008; 31:4212-4219.
-
(2008)
Computer Communications
, vol.31
, pp. 4212-4219
-
-
Yu, J.1
Lee, H.2
Kim, M.-S.3
Park, D.4
-
9
-
-
77956393826
-
Network anomaly detection through nonlinear analysis
-
Palmieri F, Fiore U. Network anomaly detection through nonlinear analysis. Computers and Security 2010; 29:737-755.
-
(2010)
Computers and Security
, vol.29
, pp. 737-755
-
-
Palmieri, F.1
Fiore, U.2
-
11
-
-
78049522894
-
-
Integrated DDoS attack defense infrastructure for effective attack prevention. Proceedings of the 2nd FTRA International Conference Information Technology Convergence and Services (ITCS 2010)
-
Yang-Seo C, Jin-Tae O, Jong-Soo J, Jae-Cheol R. Integrated DDoS attack defense infrastructure for effective attack prevention. Proceedings of the 2nd FTRA International Conference Information Technology Convergence and Services (ITCS 2010), 2010; 1-6.
-
(2010)
, pp. 1-6
-
-
Yang-Seo, C.1
Jin-Tae, O.2
Jong-Soo, J.3
Jae-Cheol, R.4
-
12
-
-
74549174089
-
-
ARM-CPD: detecting SYN flooding attack by traffic prediction. Proceedings of the 2nd IEEE International Conference on Broadband Network and Multimedia Technology (IEEE IC-BNMT 2009)
-
Qibo S, Shangguang W, Danfeng Y, Fangchun Y. ARM-CPD: detecting SYN flooding attack by traffic prediction. Proceedings of the 2nd IEEE International Conference on Broadband Network and Multimedia Technology (IEEE IC-BNMT 2009), 2009; 443-447.
-
(2009)
, pp. 443-447
-
-
Qibo, S.1
Shangguang, W.2
Danfeng, Y.3
Fangchun, Y.4
-
13
-
-
77952127491
-
-
Detection of SYN flooding attacks using generalized autoregressive conditional heteroskedasticity (GARCH) modeling technique. Proceedings of the 2010 National Conference on in Communications (NCC 2010)
-
Ranjan N, Murthy HA, Gonsalves TA. Detection of SYN flooding attacks using generalized autoregressive conditional heteroskedasticity (GARCH) modeling technique. Proceedings of the 2010 National Conference on in Communications (NCC 2010), 2010; 1-5.
-
(2010)
, pp. 1-5
-
-
Ranjan, N.1
Murthy, H.A.2
Gonsalves, T.A.3
-
14
-
-
72449205129
-
-
Network anomaly detection based on traffic prediction. Proceedings of the International Conference on in Scalable Computing and Communications; the 8th International Conference on Embedded Computing (SCALCOM-EMBEDDEDCOM 2009)
-
Fengyu W, Bin G, Yi H, Ningbo Z. Network anomaly detection based on traffic prediction. Proceedings of the International Conference on in Scalable Computing and Communications; the 8th International Conference on Embedded Computing (SCALCOM-EMBEDDEDCOM 2009), 2009; 449-454.
-
(2009)
, pp. 449-454
-
-
Fengyu, W.1
Bin, G.2
Yi, H.3
Ningbo, Z.4
-
15
-
-
84867584732
-
-
A flooding-based DoS/DDoS detecting algorithm based on traffic measurement and prediction advances in information and computer security. Proceedings of the First International Workshop on Security(IWSEC 2006)
-
Yi S, Xinyu Y, Huijun Z. A flooding-based DoS/DDoS detecting algorithm based on traffic measurement and prediction advances in information and computer security. Proceedings of the First International Workshop on Security(IWSEC 2006), 2006; 252-267.
-
(2006)
, pp. 252-267
-
-
Yi, S.1
Xinyu, Y.2
Huijun, Z.3
-
16
-
-
39749130411
-
An autonomous defense against SYN flooding attacks: detect and throttle attacks at the victim side independently
-
Xiao B, Chen W, He Y. An autonomous defense against SYN flooding attacks: detect and throttle attacks at the victim side independently. Journal of Parallel and Distributed Computing 2008; 68:456-470.
-
(2008)
Journal of Parallel and Distributed Computing
, vol.68
, pp. 456-470
-
-
Xiao, B.1
Chen, W.2
He, Y.3
-
17
-
-
70449092230
-
-
More accurate and fast SYN flood detection. Proceedings of 18th International Conference on Computer Communications and Networks (ICCCN 2009)
-
Changhua S, Chengchen H, Yi T, Bin L. More accurate and fast SYN flood detection. Proceedings of 18th International Conference on Computer Communications and Networks (ICCCN 2009), 2009; 1-6.
-
(2009)
, pp. 1-6
-
-
Changhua, S.1
Chengchen, H.2
Yi, T.3
Bin, L.4
-
18
-
-
79952454671
-
WDA: a Web farm distributed denial of service attack attenuator
-
Doron E, Wool A. WDA: a Web farm distributed denial of service attack attenuator. Computer Networks 2011; 55:1037-1051.
-
(2011)
Computer Networks
, vol.55
, pp. 1037-1051
-
-
Doron, E.1
Wool, A.2
-
20
-
-
57849101598
-
-
On the robustness of SCTP against DoS attacks. Proceedings of the 3nd FTRA International Conference on Convergence and Hybrid Information Technology (ICCIT 2008)
-
Rathgeb EP, Hohendorf C, Nordhoff M. On the robustness of SCTP against DoS attacks. Proceedings of the 3nd FTRA International Conference on Convergence and Hybrid Information Technology (ICCIT 2008), 2008; 1144-1149.
-
(2008)
, pp. 1144-1149
-
-
Rathgeb, E.P.1
Hohendorf, C.2
Nordhoff, M.3
-
21
-
-
50849151631
-
Control problems of grey system
-
Deng J. Control problems of grey system. Systems and Control Letters 1982; 1:288-294.
-
(1982)
Systems and Control Letters
, vol.1
, pp. 288-294
-
-
Deng, J.1
-
22
-
-
0001829246
-
Introduction to grey system theory
-
Deng J. Introduction to grey system theory. Journal of Grey System 1989; 1:1-24.
-
(1989)
Journal of Grey System
, vol.1
, pp. 1-24
-
-
Deng, J.1
-
26
-
-
77954391922
-
-
Measure large scale network security using adjacency matrix attack graphs. Proceedings of the 5th FTRA International Conference on Future Information Technology (FutureTech 2010)
-
Tao L, Chen D, Ronggong S. Measure large scale network security using adjacency matrix attack graphs. Proceedings of the 5th FTRA International Conference on Future Information Technology (FutureTech 2010), 2010; 1-8.
-
(2010)
, pp. 1-8
-
-
Tao, L.1
Chen, D.2
Ronggong, S.3
-
27
-
-
84856665180
-
Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
-
Ponomarchuk Y, Seo D. Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. Journal of Convergence 2010; 1:35-42.
-
(2010)
Journal of Convergence
, vol.1
, pp. 35-42
-
-
Ponomarchuk, Y.1
Seo, D.2
-
28
-
-
84255212849
-
Security enhanced routing protocol for ad hoc networks
-
Imani M, Taheri M, Naderi M. Security enhanced routing protocol for ad hoc networks. Journal of Convergence 2010; 1:43-48.
-
(2010)
Journal of Convergence
, vol.1
, pp. 43-48
-
-
Imani, M.1
Taheri, M.2
Naderi, M.3
-
29
-
-
84255215444
-
On secure communication in integrated heterogeneous wireless networks
-
Xie B, Kumar A, Zhao D, Reddy R, He B. On secure communication in integrated heterogeneous wireless networks. International Journal of Information Technology, Communications and Convergence 2010; 1:4-23.
-
(2010)
International Journal of Information Technology, Communications and Convergence
, vol.1
, pp. 4-23
-
-
Xie, B.1
Kumar, A.2
Zhao, D.3
Reddy, R.4
He, B.5
-
31
-
-
84866732289
-
Distributed and scalable intrusion detection system based on agents and intelligent techniques
-
El-Semary AM, Mostafa MG-HM. Distributed and scalable intrusion detection system based on agents and intelligent techniques. Journal of Information Processing Systems 2010; 6:481-500.
-
(2010)
Journal of Information Processing Systems
, vol.6
, pp. 481-500
-
-
El-Semary, A.M.1
Mostafa, M.-H.2
-
32
-
-
84867599210
-
Handling malicious flooding attacks through enhancement of packet processing technique in mobile ad hoc networks
-
Kim H, Chitti RB, Song J. Handling malicious flooding attacks through enhancement of packet processing technique in mobile ad hoc networks. Journal of Information Processing Systems 2011; 7:137-150.
-
(2011)
Journal of Information Processing Systems
, vol.7
, pp. 137-150
-
-
Kim, H.1
Chitti, R.B.2
Song, J.3
|