메뉴 건너뛰기




Volumn , Issue , 2012, Pages 264-270

Real-time diagnosis of network anomaly based on statistical traffic analysis

Author keywords

Anomaly diagnosis; DDoS attack; Intrusion detection; Traffic measurement

Indexed keywords

BURSTY TRAFFIC; DATA SETS; DDOS ATTACK; DISTRIBUTED DENIAL OF SERVICE ATTACK; DOS ATTACKS; HURST PARAMETER; LINCOLN LABORATORY; NETWORK ANOMALIES; NETWORK SERVICE PROVIDERS; NETWORK TRAFFIC; NETWORK USERS; PERFORMANCE METRICS; REAL-TIME DIAGNOSIS; RESPOND TIME; SECOND GROUP; SELF-SIMILAR; SIMULATION EXPERIMENTS; TRAFFIC ANALYSIS; TRAFFIC ANOMALIES; TRAFFIC MEASUREMENTS;

EID: 84868122550     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2012.233     Document Type: Conference Paper
Times cited : (11)

References (18)
  • 2
    • 84858680986 scopus 로고    scopus 로고
    • Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts
    • F. Zhang, M. Papatriantafilou, and P. Tsigas, "Mitigating distributed denial of service attacks in multiparty applications in the presence of clock drifts " IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 401-413, 2012.
    • (2012) IEEE Transactions on Dependable and Secure Computing , vol.9 , Issue.3 , pp. 401-413
    • Zhang, F.1    Papatriantafilou, M.2    Tsigas, P.3
  • 3
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-Service attacks rip the Internet
    • L. Garber, "Denial-of-Service attacks rip the Internet," IEEE Computer, vol. 33, no. 4, pp. 12-17, 2000.
    • (2000) IEEE Computer , vol.33 , Issue.4 , pp. 12-17
    • Garber, L.1
  • 4
    • 30344436961 scopus 로고    scopus 로고
    • Monitoring the macroscopic effect of DDoS flooding attacks
    • Y. Yuan, and K. Mills, "Monitoring the macroscopic effect of DDoS flooding attacks," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 4, pp. 324-335, 2005.
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.4 , pp. 324-335
    • Yuan, Y.1    Mills, K.2
  • 5
    • 79960556813 scopus 로고    scopus 로고
    • On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network
    • H. Huang, N. Ahmed, and P. Karthik, "On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network," IEEE Transactions on Wireless Communications, vol. 10, no. 7, pp. 2316-2324, 2011.
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.7 , pp. 2316-2324
    • Huang, H.1    Ahmed, N.2    Karthik, P.3
  • 7
    • 78649982369 scopus 로고    scopus 로고
    • Detection of multicast video flooding attack using the pattern of bandwidth provisioning efficiency
    • N. Kim, H. Lim, H. Park, and M. Kang, "Detection of multicast video flooding attack using the pattern of bandwidth provisioning efficiency," IEEE Communications Letters, vol. 14, no. 12, pp. 1170-1172, 2010.
    • (2010) IEEE Communications Letters , vol.14 , Issue.12 , pp. 1170-1172
    • Kim, N.1    Lim, H.2    Park, H.3    Kang, M.4
  • 9
    • 45749141660 scopus 로고    scopus 로고
    • Statistical techniques for detecting traffic anomalies through packet header data
    • S. S. Kim, and A. L. N. Reddy, "Statistical techniques for detecting traffic anomalies through packet header data," IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 562-575, 2008.
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.3 , pp. 562-575
    • Kim, S.S.1    Reddy, A.L.N.2
  • 10
    • 67649889403 scopus 로고    scopus 로고
    • Flexible deterministic Packet marking: An IP traceback system to find the real source of attacks
    • Y. Xiang, W.-L. Zhou, and M.-Y. Guo, "Flexible deterministic Packet marking: An IP traceback system to find the real source of attacks," IEEE Transaction on Parallel and Distributed Systems, vol. 20, no. 4, pp. 567-580, 2009.
    • (2009) IEEE Transaction on Parallel and Distributed Systems , vol.20 , Issue.4 , pp. 567-580
    • Xiang, Y.1    Zhou, W.-L.2    Guo, M.-Y.3
  • 11
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer DDoS attacks for popular websites
    • Y. Xie, and S.-Z. Yu, "Monitoring the application-layer DDoS attacks for popular websites," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 15-25, 2009.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2
  • 12
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-markov model for anomaly detection on user browsing behaviours
    • Y. Xie, and S.-Z. Yu, "A large-scale hidden semi-markov model for anomaly detection on user browsing behaviours," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 54-65, 2009.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.-Z.2
  • 15
    • 40949163757 scopus 로고    scopus 로고
    • Differentiating Malicious DDoS attack traffic from normal TCP flows by proactive tests
    • Z.-Q. Gao, and N. Ansari, "Differentiating Malicious DDoS attack traffic from normal TCP flows by proactive tests," IEEE Communications Letters, vol. 10, no. 11, pp. 793-795, 2006.
    • (2006) IEEE Communications Letters , vol.10 , Issue.11 , pp. 793-795
    • Gao, Z.-Q.1    Ansari, N.2
  • 16
    • 2442583303 scopus 로고    scopus 로고
    • The LoSS technique for detecting new Denial of Service attacks
    • W. H. Allen, and G. A. Marin, "The LoSS technique for detecting new Denial of Service attacks " in IEEE Southeast Conference, 2004, pp. 302-309.
    • IEEE Southeast Conference, 2004 , pp. 302-309
    • Allen, W.H.1    Marin, G.A.2
  • 17
    • 0028377540 scopus 로고
    • On the self-similar nature of Ethernet traffic (extended version)
    • W. E. Leland, M. S. Taqqu, and W. Willinger, "On the self-similar nature of Ethernet traffic (extended version)," IEEE/ACM Transactions on Networking, vol. 2, no. 1, pp. 1-15, 1994.
    • (1994) IEEE/ACM Transactions on Networking , vol.2 , Issue.1 , pp. 1-15
    • Leland, W.E.1    Taqqu, M.S.2    Willinger, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.