-
1
-
-
39749130411
-
An autonomous defense against syn flooding attacks: Detect and throttle attacks at the victim side independently
-
Apr.
-
B. Xiao, W. Chen, and Y. He, "An autonomous defense against syn flooding attacks: Detect and throttle attacks at the victim side independently," J. Parallel Distrib. Comput., vol. 68, no. 4, pp. 456-470, Apr. 2008.
-
(2008)
J. Parallel Distrib. Comput.
, vol.68
, Issue.4
, pp. 456-470
-
-
Xiao, B.1
Chen, W.2
He, Y.3
-
3
-
-
84868141742
-
-
Arbor Networks, Online. Available
-
Worldwide Infrastructure Security Report, Volume VI, Arbor Networks, 2010. [Online]. Available: http://www.arbornetworks.com/report
-
(2010)
Worldwide Infrastructure Security Report
, vol.6
-
-
-
4
-
-
21844451952
-
Diagnosing networkwide traffic anomalies
-
Aug.
-
A. Lakhina, M. Crovella, and C. Diot, "Diagnosing networkwide traffic anomalies," SIGCOMM Comput. Commun. Rev., vol. 34, pp. 219-230, Aug. 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
5
-
-
23944521338
-
An active detecting method against syn flooding attack
-
july Vol. 1
-
B. Xiao, W. Chen, Y. He, and E.-M. Sha, "An active detecting method against syn flooding attack," in Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on, vol. 1, july 2005, pp. 709-715 Vol. 1.
-
(2005)
Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on
, vol.1
, pp. 709-715
-
-
Xiao, B.1
Chen, W.2
He, Y.3
Sha, E.-M.4
-
6
-
-
79957683649
-
Anomaly detection using chi-square values based on the typical features and the time deviation
-
vol. 0
-
S. Oshima, T. Nakashima, and T. Sueyoshi, "Anomaly detection using chi-square values based on the typical features and the time deviation," AINA, vol. 0, pp. 97-104, 2011.
-
(2011)
AINA
, pp. 97-104
-
-
Oshima, S.1
Nakashima, T.2
Sueyoshi, T.3
-
8
-
-
36348929372
-
Collaborative detection of ddos attacks over multiple network domains
-
Dec.
-
Y. Chen, K. Hwang, and W.-S. Ku., "Collaborative detection of ddos attacks over multiple network domains," IEEE Trans. Parallel Distrib. Syst., vol. 18, pp. 1649-1662, Dec. 2007.
-
(2007)
IEEE Trans. Parallel Distrib. Syst.
, vol.18
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
9
-
-
77956377864
-
A scalable, efficient and informative approach for anomaly-based intrusion detection systems: Theory and practice
-
September
-
O. Salem, S. Vaton, and A. Gravey, "A scalable, efficient and informative approach for anomaly-based intrusion detection systems: theory and practice," Int. J. Netw. Manag., vol. 20, pp. 271-293, September 2010.
-
(2010)
Int. J. Netw. Manag.
, vol.20
, pp. 271-293
-
-
Salem, O.1
Vaton, S.2
Gravey, A.3
-
10
-
-
84255199997
-
A scalable ddos detection framework with victim pinpoint capability
-
H. Liu, Y. Sun, and M. S. Kim, "A scalable ddos detection framework with victim pinpoint capability," Journal of Communications, vol. 6, no. 9, 2011.
-
(2011)
Journal of Communications
, vol.6
, Issue.9
-
-
Liu, H.1
Sun, Y.2
Kim, M.S.3
-
11
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
ACM
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: methods, evaluation, and applications," in IMC '03. ACM, 2003, pp. 234-247.
-
(2003)
IMC '03
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
12
-
-
14944385135
-
Reversible sketches for efficient and accurate change detection over network data streams
-
New York, NY, USA: ACM
-
R. Schweller, A. Gupta, E. Parsons, and Y. Chen, "Reversible sketches for efficient and accurate change detection over network data streams," in IMC '04. New York, NY, USA: ACM, 2004, pp. 207-212.
-
(2004)
IMC '04
, pp. 207-212
-
-
Schweller, R.1
Gupta, A.2
Parsons, E.3
Chen, Y.4
-
13
-
-
77953234751
-
Hifind: A high-speed flow-level intrusion detection approach with dos resiliency
-
Jun.
-
Z. Li, Y. Gao, and Y. Chen, "Hifind: A high-speed flow-level intrusion detection approach with dos resiliency," Comput. Netw., vol. 54, no. 8, pp. 1282-1299, Jun. 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.8
, pp. 1282-1299
-
-
Li, Z.1
Gao, Y.2
Chen, Y.3
-
14
-
-
52049087546
-
Distributed divide-and-conquer techniques for effective ddos attack defenses
-
june
-
M. Muthuprasanna and G. Manimaran, "Distributed divide-and-conquer techniques for effective ddos attack defenses," in ICDCS '08., june 2008, pp. 93-102.
-
(2008)
ICDCS '08
, pp. 93-102
-
-
Muthuprasanna, M.1
Manimaran, G.2
-
15
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
April
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the dos and ddos problems," ACM Comput. Surv., vol. 39, April 2007.
-
(2007)
ACM Comput. Surv.
, vol.39
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
16
-
-
14844367057
-
An improved data stream summary: The count-min sketch and its applications
-
Apr.
-
G. Cormode and S. Muthukrishnan, "An improved data stream summary: the count-min sketch and its applications," J. Algorithms, vol. 55, no. 1, pp. 58-75, Apr. 2005.
-
(2005)
J. Algorithms
, vol.55
, Issue.1
, pp. 58-75
-
-
Cormode, G.1
Muthukrishnan, S.2
-
18
-
-
0009874629
-
On the stop-loss and total variation distances between random sums
-
M. Denuit and S. V. Bellegem, "On the stop-loss and total variation distances between random sums," Statistics & Probability Letters, vol. 53, no. 2, pp. 153-165, 2001.
-
(2001)
Statistics & Probability Letters
, vol.53
, Issue.2
, pp. 153-165
-
-
Denuit, M.1
Bellegem, S.V.2
|