-
2
-
-
84870776729
-
-
last accessed 30/03/2012
-
SOAP 1.1, (2008), http://www.w3.org/TR/soap/, last accessed 30/03/2012
-
(2008)
SOAP 1.1
-
-
-
4
-
-
34147099073
-
Survey of Network- Based Defense Mechanisms Countering the DoS and DDoS Problems
-
Article 3
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of Network- Based Defense Mechanisms Countering the DoS and DDoS Problems," ACM Computing Surveys, vol. 39, no. 1, Article 3, 2007.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
5
-
-
33947503628
-
Defense Against Spoofed IP Traffic Using Hop-Count Filtering
-
H. Wang, C. Jin, and K. G. Shin, "Defense Against Spoofed IP Traffic Using Hop-Count Filtering," IEEE/ACM Transactions on Networking, vol. 15, no. 1 pages 40-53, 2007,
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
6
-
-
33947507304
-
On Scalable Attack Detection in the Network
-
R. R. Kompella, S. Singh, and G. Varghese, "On Scalable Attack Detection in the Network," IEEE/ACM Transactions on Networking, vol. 15, no. 1, pages 14-25, 2007.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.1
, pp. 14-25
-
-
Kompella, R.R.1
Singh, S.2
Varghese, G.3
-
7
-
-
34247601459
-
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
-
R. Chen, J. Park, and R. Marchany, "A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp. 577-588, 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.5
, pp. 577-588
-
-
Chen, R.1
Park, J.2
Marchany, R.3
-
8
-
-
70350422660
-
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
-
Sept.
-
A. Chonka, W. Zhou, and J. Singh, "Chaos Theory Based Detection against Network Mimicking DDoS Attacks", IEEE Communications Letters, Volume 13, Issue 9, pages 717-719, Sept. 2009,.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.9
, pp. 717-719
-
-
Chonka, A.1
Zhou, W.2
Singh, J.3
-
9
-
-
33749831619
-
StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense
-
A. Yaar, A. Perrig, and D. Song, "StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense," IEEE Journal of Selected Areas in Communication, vol. 24, no. 10, 2006.
-
(2006)
IEEE Journal of Selected Areas in Communication
, vol.24
, Issue.10
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
10
-
-
39049125624
-
Controlling IP Spoofing through Interdomain Packet Filters
-
Z. Duan, X. Yuan, and J. Chandrashekar, "Controlling IP Spoofing through Interdomain Packet Filters," IEEE Transactions on Dependable and Secure Computing, vol.5, no. 1, pp. 22-36, 2007.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.1
, pp. 22-36
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
11
-
-
70349658385
-
Optimal Filtering of Source Address Prefixes: Models and Algorithms
-
F. Soldo, A. Markopoulou, and K. Argyraki, "Optimal Filtering of Source Address Prefixes: Models and Algorithms," IEEE INFOCOM, Roi de Janeiro, Brazil, 2009.
-
IEEE INFOCOM, Roi de Janeiro, Brazil, 2009
-
-
Soldo, F.1
Markopoulou, A.2
Argyraki, K.3
-
12
-
-
70349659341
-
Adaptive Early Packet Filtering for Protecting Firewalls against DoS Attacks
-
A. El-Atawy, E. Al-Shaer, T. Tran et al., "Adaptive Early Packet Filtering for Protecting Firewalls against DoS Attacks," IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
-
IEEE INFOCOM, Rio de Janeiro, Brazil, 2009
-
-
El-Atawy, A.1
Al-Shaer, E.2
Tran, T.3
-
13
-
-
79956153885
-
Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XMLDoS Attacks
-
Elsevier
-
A.Chonka, Y.Xiang, W. Zhou, and A. Bonti, , Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XMLDoS Attacks, Journal of Network and Computer Applications, Elsevier, vol. 3, no. 4, pages 1097-1107, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.3
, Issue.4
, pp. 1097-1107
-
-
Chonka, A.1
Xiang, Y.2
Zhou, W.3
Bonti, A.4
-
14
-
-
67349095739
-
A decision support system for constructing an alert classification model
-
October
-
N.Y Jan, S.C. Lin, S.S. Tseng,, N.P. Lin, "A decision support system for constructing an alert classification model" Expert Systems with Applications, Volume 36, Issue 8, Pages 11145-11155, October 2009
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.8
, pp. 11145-11155
-
-
Jan, N.Y.1
Lin, S.C.2
Tseng, S.S.3
Lin, N.P.4
-
15
-
-
40649126581
-
Compiling network traffic into rules using soft computing methods for the detection of flooding attacks
-
June
-
S. Noh, G. Jung, K. Choi, C. Lee, "Compiling network traffic into rules using soft computing methods for the detection of flooding attacks" Applied Soft Computing, Volume 8, Issue 3, pages 1200-1210, June 2008.
-
(2008)
Applied Soft Computing
, vol.8
, Issue.3
, pp. 1200-1210
-
-
Noh, S.1
Jung, G.2
Choi, K.3
Lee, C.4
-
16
-
-
40849099949
-
Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
-
1 May
-
C.Xiang, P.C.Yong, and L.S. Meng, "Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees", Pattern Recognition Letters, Volume 29, Issue 7, pages 918-924, 1 May 2008
-
(2008)
Pattern Recognition Letters
, vol.29
, Issue.7
, pp. 918-924
-
-
Xiang, C.1
Yong, P.C.2
Meng, L.S.3
-
18
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
September
-
C. Yu and H. Kai , "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis", Journal of Parallel and Distributed Systems, Volume 66, Issue 9, pages 1137-1151, September 2006.
-
(2006)
Journal of Parallel and Distributed Systems
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Yu, C.1
Kai, H.2
-
20
-
-
38949108959
-
Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach
-
Volume , Issue
-
S. Padmanabhuni, V. Singh, K.M Senthil and A. Chatterjee, "Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach", ICWS apos;06. International Conference on Volume , Issue , pp 577-584, 2006
-
(2006)
ICWS Apos;06. International Conference on
, pp. 577-584
-
-
Padmanabhuni, S.1
Singh, V.2
Senthil, K.M.3
Chatterjee, A.4
-
21
-
-
47749117614
-
SOA and Web Services: New Technologies, New Standards - New Attacks
-
0-7695-3044-3/07
-
M. Jensen, N. Gruschka, R. Herkenhöner and N. Luttenberger,"SOA and Web Services: New Technologies, New Standards - New Attacks" Fifth European Conference on Web Services, 0-7695-3044-3/07, 2007.
-
(2007)
Fifth European Conference on Web Services
-
-
Jensen, M.1
Gruschka, N.2
Herkenhöner, R.3
Luttenberger, N.4
-
23
-
-
49149101625
-
Detecting and Tracing DDoS attacks by Intelligent Decision Prototype (IDP)
-
A. Chonka, W. Zhou, Y. Xiang, and J. Singh, "Detecting and Tracing DDoS attacks by Intelligent Decision Prototype (IDP)", IEEE Workshop on Web and Pervasive Security, IEEE, pp. 578-583, 2008.
-
(2008)
IEEE Workshop on Web and Pervasive Security, IEEE
, pp. 578-583
-
-
Chonka, A.1
Zhou, W.2
Xiang, Y.3
Singh, J.4
-
24
-
-
51849137884
-
Protecting Web Services with Service Oriented Traceback Architecture
-
A. Chonka, W.Zhou, and Y.Xiang, "Protecting Web Services with Service Oriented Traceback Architecture", IEEE 8th International Conference on Computer and Information Technology, IEEE, pp. 706-711, 2008.
-
(2008)
IEEE 8th International Conference on Computer and Information Technology, IEEE
, pp. 706-711
-
-
Chonka, A.1
Zhou, W.2
Xiang, Y.3
-
26
-
-
84870789004
-
-
StuPot Project, Deakin University, last accessed 30th March
-
StuPot Project, "HXDoS Dataset", Deakin University, http://www.deakin.edu.au/~chonka/ , last accessed 30th March, 2012.
-
(2012)
HXDoS Dataset
-
-
-
27
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
C. Jin , H. Wang , K.G. Shin, Hop-count filtering: an effective defense against spoofed DDoS traffic, Proceedings of the 10th ACM conference on Computer and communications security, October 27-30, 2003, Pages: 30 - 41
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, October 27-30, 2003
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
28
-
-
8344244591
-
An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition
-
October
-
M. Li, An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition, Computers & Security, Volume 23, Issue 7, October 2004, Pages 549-558.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 549-558
-
-
Li, M.1
-
29
-
-
77953077374
-
Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites
-
J. Jung and B. Krishnamurthy and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In WWW, Hawaii, May 2002.
-
WWW, Hawaii, May 2002
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
30
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
October 27-30
-
C. Jin , H. Wang , K. G. Shin, "Hop-count filtering: an effective defense against spoofed DDoS traffic", Proceedings of the 10th ACM conference on Computer and communications security, Pages: 30-41, October 27-30, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
31
-
-
21244462147
-
-
last accessed 03/04/2012
-
Nadalin, A., Kaler, C., Monzillo, R., and Hallam-Baker. P., (2008), 'Web Services Security: SOAP Message Security 1.1 (WSSecurity 2004)', http://docs.oasis-open.org/wss/v1.1/, last accessed 03/04/2012.
-
(2008)
Web Services Security: SOAP Message Security 1.1 (WSSecurity 2004)
-
-
Nadalin, A.1
Kaler, C.2
Monzillo, R.3
Hallam-Baker, P.4
-
32
-
-
51849153577
-
-
XML -Signature, last accessed 03/04/2012
-
XML -Signature, 'XML-Signature Syntax and Processing' http://www.w3.org/TR/xmldsig-core/ last accessed 03/04/2012.
-
XML-Signature Syntax and Processing
-
-
-
33
-
-
51849153577
-
-
XML- Encryption, last accessed 03/04/2012
-
XML- Encryption, 'XML-Signature Syntax and Processing' http://www.w3.org/TR/xmlenc-core/ last accessed 03/04/2012.
-
XML-Signature Syntax and Processing
-
-
-
34
-
-
73549113094
-
A taxonomy and survey of cloud computing systems
-
B. P. Rimal, E. Choi, and I. Lumb, "A taxonomy and survey of cloud computing systems," International Joint Conference on INC, IMS and IDC, Jan 2009.
-
International Joint Conference on INC, IMS and IDC, Jan 2009
-
-
Rimal, B.P.1
Choi, E.2
Lumb, I.3
|