-
1
-
-
0141723181
-
-
KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html.7http://www.endace.com/dag-7.5g2-datasheet.html.
-
KDD Cup 1999 Data
-
-
-
2
-
-
84871145229
-
-
UCSD
-
The CAIDA UCSD "DDoS Attack 2007" Dataset. http://www.caida. org/data/passive/ddos-20070804-dataset.xml.
-
DDoS Attack 2007 Dataset
-
-
-
3
-
-
84867971022
-
Use of IP addresses for high rate flooding attack detection
-
IFIP World Computer Congress, Brisbane, Australia, 20-23, September
-
E. Ahmed, G. Mohay, A. Tickle, and S. Bhatia. Use of IP Addresses for High Rate Flooding Attack Detection. In Proceedings of the International Information Security Conference (SEC 2010): Security and Privacy - Silver Lining in the Cloud, IFIP World Computer Congress, Brisbane, Australia, 20-23, September 2010.
-
(2010)
Proceedings of the International Information Security Conference (SEC 2010): Security and Privacy - Silver Lining in the Cloud
-
-
Ahmed, E.1
Mohay, G.2
Tickle, A.3
Bhatia, S.4
-
6
-
-
84867940574
-
Modelling web-server flash events
-
IEEE
-
S. Bhatia, G. Mohay, D. Schmidt, and A. Tickle. Modelling web-server flash events. In Proceedings of The 11th IEEE International Symposium on Network Computing and Applications (NCA) 2012, pages 79-86. IEEE, 2012.
-
(2012)
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications (NCA) 2012
, pp. 79-86
-
-
Bhatia, S.1
Mohay, G.2
Schmidt, D.3
Tickle, A.4
-
7
-
-
80455144626
-
Parametric differences between a real-world distributed denial-of-service attack and a flash event
-
IEEE, 2011
-
S. Bhatia, G. Mohay, A. Tickle, and E. Ahmed. Parametric differences between a real-world distributed denial-of-service attack and a flash event. In Proceedings of Sixth International Conference on Availability, Reliability and Security (ARES), 2011, pages 210-217. IEEE, 2011.
-
(2011)
Proceedings of Sixth International Conference on Availability, Reliability and Security (ARES)
, pp. 210-217
-
-
Bhatia, S.1
Mohay, G.2
Tickle, A.3
Ahmed, E.4
-
9
-
-
0002000920
-
Denial-of-service attacks rip the internet
-
L. Garber. Denial-of-service attacks rip the Internet. Computer, 33(4):12-17, 2000.
-
(2000)
Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
13
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds
-
USENIX Association
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger. Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation- Volume 2, pages 287-300. USENIX Association, 2005.
-
(2005)
Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation
, vol.2
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
15
-
-
85084161590
-
Political DDoS: Estonia and beyond
-
July 28-Aug 1, San Jose, CA, USA, 2008, Invited Talk
-
J. Nazario. Political DDoS: Estonia and Beyond . In Invited Talk, in 17th USENIX Security Symposium, July 28-Aug 1, 2008, San Jose, CA, USA, 2008.
-
(2008)
17th USENIX Security Symposium
-
-
Nazario, J.1
-
16
-
-
56649106403
-
Distinguishing between FE and DDoS using randomness check
-
H. Park, P. Li, D. Gao, H. Lee, and R. Deng. Distinguishing between FE and DDoS Using Randomness Check. Information Security, pages 131-145, 2008.
-
(2008)
Information Security
, pp. 131-145
-
-
Park, H.1
Li, P.2
Gao, D.3
Lee, H.4
Deng, R.5
-
18
-
-
33745371142
-
Proactively detecting distributed denial of service attacks using source IP address monitoring
-
T. Peng, C. Leckie, and K. Ramamohanarao. Proactively detecting distributed denial of service attacks using source IP address monitoring. NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, pages 771-782, 2004.
-
(2004)
Networking 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications
, pp. 771-782
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
19
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
USENIX Association
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, page 5. USENIX Association, 2007.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 5
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
21
-
-
84954358597
-
Traffic flooding attack detection with SNMP MIB using SVM
-
J. Yu, H. Lee, M. Kim, and D. Park. Traffic flooding attack detection with SNMP MIB using SVM. Computer Communications, 31(17):4212-4219, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.17
, pp. 4212-4219
-
-
Yu, J.1
Lee, H.2
Kim, M.3
Park, D.4
|