메뉴 건너뛰기




Volumn 5, Issue 10, 2012, Pages 1131-1140

Detecting SYN flooding attacks based on traffic prediction

Author keywords

Denial of service; Grey system theory; SYN flooding attacks; Traffic prediction

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; FLOODS; FORECASTING; NETWORK SECURITY; SYSTEM THEORY; TRAFFIC CONTROL;

EID: 84867612184     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.428     Document Type: Article
Times cited : (16)

References (32)
  • 1
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • Zhou CV, Leckie C, Karunasekera S. A survey of coordinated attacks and collaborative intrusion detection. Computers and Security 2010; 29:124-140.
    • (2010) Computers and Security , vol.29 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 2
    • 77953234751 scopus 로고    scopus 로고
    • HiFIND: a high-speed flow-level intrusion detection approach with DoS resiliency
    • Li Z, Gao Y, Chen Y. HiFIND: a high-speed flow-level intrusion detection approach with DoS resiliency. Computer Networks 2010; 54:1282-1299.
    • (2010) Computer Networks , vol.54 , pp. 1282-1299
    • Li, Z.1    Gao, Y.2    Chen, Y.3
  • 3
    • 70449625471 scopus 로고    scopus 로고
    • Source detection of SYN flooding attacks. Proceedings of the 2009 International Conference on Network and Service Security (N2S 2009)
    • Bellaiche M, Gregoire J-C. Source detection of SYN flooding attacks. Proceedings of the 2009 International Conference on Network and Service Security (N2S 2009), 2009; 1-6.
    • (2009) , pp. 1-6
    • Bellaiche, M.1    Gregoire, J.-C.2
  • 4
    • 58149102866 scopus 로고    scopus 로고
    • Detecting SYN flooding agents under any type of IP spoofing. Proceedings of IEEE International Conference on e-Business Engineering (ICEBE 200)
    • Nashat D, Xiaohong J, Horiguchi S. Detecting SYN flooding agents under any type of IP spoofing. Proceedings of IEEE International Conference on e-Business Engineering (ICEBE 200), 2008; 499-505.
    • (2008) , pp. 499-505
    • Nashat, D.1    Xiaohong, J.2    Horiguchi, S.3
  • 6
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002)
    • Haining W, Danlu Z, Kang GS. Detecting SYN flooding attacks. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), 2002; 1530-1539.
    • (2002) , pp. 1530-1539
    • Haining, W.1    Danlu, Z.2    Kang, G.S.3
  • 7
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • Siris VA, Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications 2006; 29:1433-1442.
    • (2006) Computer Communications , vol.29 , pp. 1433-1442
    • Siris, V.A.1    Papagalou, F.2
  • 8
    • 84954358597 scopus 로고    scopus 로고
    • Traffic flooding attack detection with SNMP MIB using SVM
    • Yu J, Lee H, Kim M-S, Park D. Traffic flooding attack detection with SNMP MIB using SVM. Computer Communications 2008; 31:4212-4219.
    • (2008) Computer Communications , vol.31 , pp. 4212-4219
    • Yu, J.1    Lee, H.2    Kim, M.-S.3    Park, D.4
  • 9
    • 77956393826 scopus 로고    scopus 로고
    • Network anomaly detection through nonlinear analysis
    • Palmieri F, Fiore U. Network anomaly detection through nonlinear analysis. Computers and Security 2010; 29:737-755.
    • (2010) Computers and Security , vol.29 , pp. 737-755
    • Palmieri, F.1    Fiore, U.2
  • 11
    • 78049522894 scopus 로고    scopus 로고
    • Integrated DDoS attack defense infrastructure for effective attack prevention. Proceedings of the 2nd FTRA International Conference Information Technology Convergence and Services (ITCS 2010)
    • Yang-Seo C, Jin-Tae O, Jong-Soo J, Jae-Cheol R. Integrated DDoS attack defense infrastructure for effective attack prevention. Proceedings of the 2nd FTRA International Conference Information Technology Convergence and Services (ITCS 2010), 2010; 1-6.
    • (2010) , pp. 1-6
    • Yang-Seo, C.1    Jin-Tae, O.2    Jong-Soo, J.3    Jae-Cheol, R.4
  • 12
    • 74549174089 scopus 로고    scopus 로고
    • ARM-CPD: detecting SYN flooding attack by traffic prediction. Proceedings of the 2nd IEEE International Conference on Broadband Network and Multimedia Technology (IEEE IC-BNMT 2009)
    • Qibo S, Shangguang W, Danfeng Y, Fangchun Y. ARM-CPD: detecting SYN flooding attack by traffic prediction. Proceedings of the 2nd IEEE International Conference on Broadband Network and Multimedia Technology (IEEE IC-BNMT 2009), 2009; 443-447.
    • (2009) , pp. 443-447
    • Qibo, S.1    Shangguang, W.2    Danfeng, Y.3    Fangchun, Y.4
  • 13
    • 77952127491 scopus 로고    scopus 로고
    • Detection of SYN flooding attacks using generalized autoregressive conditional heteroskedasticity (GARCH) modeling technique. Proceedings of the 2010 National Conference on in Communications (NCC 2010)
    • Ranjan N, Murthy HA, Gonsalves TA. Detection of SYN flooding attacks using generalized autoregressive conditional heteroskedasticity (GARCH) modeling technique. Proceedings of the 2010 National Conference on in Communications (NCC 2010), 2010; 1-5.
    • (2010) , pp. 1-5
    • Ranjan, N.1    Murthy, H.A.2    Gonsalves, T.A.3
  • 14
    • 72449205129 scopus 로고    scopus 로고
    • Network anomaly detection based on traffic prediction. Proceedings of the International Conference on in Scalable Computing and Communications; the 8th International Conference on Embedded Computing (SCALCOM-EMBEDDEDCOM 2009)
    • Fengyu W, Bin G, Yi H, Ningbo Z. Network anomaly detection based on traffic prediction. Proceedings of the International Conference on in Scalable Computing and Communications; the 8th International Conference on Embedded Computing (SCALCOM-EMBEDDEDCOM 2009), 2009; 449-454.
    • (2009) , pp. 449-454
    • Fengyu, W.1    Bin, G.2    Yi, H.3    Ningbo, Z.4
  • 15
    • 84867584732 scopus 로고    scopus 로고
    • A flooding-based DoS/DDoS detecting algorithm based on traffic measurement and prediction advances in information and computer security. Proceedings of the First International Workshop on Security(IWSEC 2006)
    • Yi S, Xinyu Y, Huijun Z. A flooding-based DoS/DDoS detecting algorithm based on traffic measurement and prediction advances in information and computer security. Proceedings of the First International Workshop on Security(IWSEC 2006), 2006; 252-267.
    • (2006) , pp. 252-267
    • Yi, S.1    Xinyu, Y.2    Huijun, Z.3
  • 16
    • 39749130411 scopus 로고    scopus 로고
    • An autonomous defense against SYN flooding attacks: detect and throttle attacks at the victim side independently
    • Xiao B, Chen W, He Y. An autonomous defense against SYN flooding attacks: detect and throttle attacks at the victim side independently. Journal of Parallel and Distributed Computing 2008; 68:456-470.
    • (2008) Journal of Parallel and Distributed Computing , vol.68 , pp. 456-470
    • Xiao, B.1    Chen, W.2    He, Y.3
  • 17
    • 70449092230 scopus 로고    scopus 로고
    • More accurate and fast SYN flood detection. Proceedings of 18th International Conference on Computer Communications and Networks (ICCCN 2009)
    • Changhua S, Chengchen H, Yi T, Bin L. More accurate and fast SYN flood detection. Proceedings of 18th International Conference on Computer Communications and Networks (ICCCN 2009), 2009; 1-6.
    • (2009) , pp. 1-6
    • Changhua, S.1    Chengchen, H.2    Yi, T.3    Bin, L.4
  • 18
    • 79952454671 scopus 로고    scopus 로고
    • WDA: a Web farm distributed denial of service attack attenuator
    • Doron E, Wool A. WDA: a Web farm distributed denial of service attack attenuator. Computer Networks 2011; 55:1037-1051.
    • (2011) Computer Networks , vol.55 , pp. 1037-1051
    • Doron, E.1    Wool, A.2
  • 20
    • 57849101598 scopus 로고    scopus 로고
    • On the robustness of SCTP against DoS attacks. Proceedings of the 3nd FTRA International Conference on Convergence and Hybrid Information Technology (ICCIT 2008)
    • Rathgeb EP, Hohendorf C, Nordhoff M. On the robustness of SCTP against DoS attacks. Proceedings of the 3nd FTRA International Conference on Convergence and Hybrid Information Technology (ICCIT 2008), 2008; 1144-1149.
    • (2008) , pp. 1144-1149
    • Rathgeb, E.P.1    Hohendorf, C.2    Nordhoff, M.3
  • 21
    • 50849151631 scopus 로고
    • Control problems of grey system
    • Deng J. Control problems of grey system. Systems and Control Letters 1982; 1:288-294.
    • (1982) Systems and Control Letters , vol.1 , pp. 288-294
    • Deng, J.1
  • 22
    • 0001829246 scopus 로고
    • Introduction to grey system theory
    • Deng J. Introduction to grey system theory. Journal of Grey System 1989; 1:1-24.
    • (1989) Journal of Grey System , vol.1 , pp. 1-24
    • Deng, J.1
  • 26
    • 77954391922 scopus 로고    scopus 로고
    • Measure large scale network security using adjacency matrix attack graphs. Proceedings of the 5th FTRA International Conference on Future Information Technology (FutureTech 2010)
    • Tao L, Chen D, Ronggong S. Measure large scale network security using adjacency matrix attack graphs. Proceedings of the 5th FTRA International Conference on Future Information Technology (FutureTech 2010), 2010; 1-8.
    • (2010) , pp. 1-8
    • Tao, L.1    Chen, D.2    Ronggong, S.3
  • 27
    • 84856665180 scopus 로고    scopus 로고
    • Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
    • Ponomarchuk Y, Seo D. Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. Journal of Convergence 2010; 1:35-42.
    • (2010) Journal of Convergence , vol.1 , pp. 35-42
    • Ponomarchuk, Y.1    Seo, D.2
  • 28
    • 84255212849 scopus 로고    scopus 로고
    • Security enhanced routing protocol for ad hoc networks
    • Imani M, Taheri M, Naderi M. Security enhanced routing protocol for ad hoc networks. Journal of Convergence 2010; 1:43-48.
    • (2010) Journal of Convergence , vol.1 , pp. 43-48
    • Imani, M.1    Taheri, M.2    Naderi, M.3
  • 31
    • 84866732289 scopus 로고    scopus 로고
    • Distributed and scalable intrusion detection system based on agents and intelligent techniques
    • El-Semary AM, Mostafa MG-HM. Distributed and scalable intrusion detection system based on agents and intelligent techniques. Journal of Information Processing Systems 2010; 6:481-500.
    • (2010) Journal of Information Processing Systems , vol.6 , pp. 481-500
    • El-Semary, A.M.1    Mostafa, M.-H.2
  • 32
    • 84867599210 scopus 로고    scopus 로고
    • Handling malicious flooding attacks through enhancement of packet processing technique in mobile ad hoc networks
    • Kim H, Chitti RB, Song J. Handling malicious flooding attacks through enhancement of packet processing technique in mobile ad hoc networks. Journal of Information Processing Systems 2011; 7:137-150.
    • (2011) Journal of Information Processing Systems , vol.7 , pp. 137-150
    • Kim, H.1    Chitti, R.B.2    Song, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.