-
1
-
-
84893496533
-
Aberrant behavior detection in Time Series for Network Monitoring
-
Dec.
-
J. D. Brutlag, "Aberrant behavior detection in Time Series for Network Monitoring," in the 14th USENIX Conference, pp. 139-146, Dec. 2000.
-
(2000)
The 14th USENIX Conference
, pp. 139-146
-
-
Brutlag, J.D.1
-
2
-
-
84874954399
-
-
Captus Networks.
-
Captus Networks. (http://www.captusnetworks.com)
-
-
-
-
3
-
-
84874957801
-
-
DeepNines Technologies
-
DeepNines Technologies. (http://www.deepnines.com)
-
-
-
-
4
-
-
1242310086
-
Automatically inferring patterns of resource consumption innetwork traffic
-
C. Estan, S. Savage, and G. Varghese, "Automatically inferring patterns of resource consumption innetwork traffic," in Proceedings of 2003 ACM SIGCOMM, pp 137-148, 2003.
-
(2003)
Proceedings of 2003 ACM SIGCOMM
, pp. 137-148
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
5
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
Washington, DC, Apr
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, "Statistical approaches to DDoS attack detection and response," in Proceedings DARPA Information Survivability Conference and Exposition, vol. 1, pp. 303-314, Washington, DC, Apr. 2003.
-
(2003)
Proceedings DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
6
-
-
4143081502
-
A Covariance analysis model for DDoS attack detection
-
S. Jin, and D. S. Yeung, "A Covariance analysis model for DDoS attack detection," in Proceedings of 2004 IEEE ICC, pp. 1882-1886, 2004.
-
(2004)
Proceedings of 2004 IEEE ICC
, pp. 1882-1886
-
-
Jin, S.1
Yeung, D.S.2
-
7
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites," in Proceedings of the International World Wide Web Conference, pp. 252-262, May 2002.
-
(2002)
Proceedings of the International World Wide Web Conference
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
8
-
-
8344261545
-
PacketScore: statistics-based overload control against distributed denial-of-service attacks
-
Mar
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "PacketScore: statistics-based overload control against distributed denial-of-service attacks," in Proceedings of IEEE INFOCOM, pp. 2594-2604, Mar. 2004.
-
(2004)
Proceedings of IEEE INFOCOM
, pp. 2594-2604
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
9
-
-
6344258028
-
Early statistical anomaly intrusion detection of DOS attacks using MIB traffic parameters
-
June
-
J. Li, and C. Manikopoulos, "Early statistical anomaly intrusion detection of DOS attacks using MIB traffic parameters," in Proceedings of 2003 IEEE Workshop on Information Assurance, pp. 53-59, June 2003.
-
(2003)
Proceedings of 2003 IEEE Workshop on Information Assurance
, pp. 53-59
-
-
Li, J.1
Manikopoulos, C.2
-
10
-
-
25844492549
-
On the ef- fectiveness of DDoS attacks on statistical filtering
-
Q. Li, E. C. Chang, and M. C. Chan, "On the ef- fectiveness of DDoS attacks on statistical filtering," in Proceedings of IEEE INFOCOM, pp. 1373-1383, 2005.
-
(2005)
Proceedings of IEEE INFOCOM
, pp. 1373-1383
-
-
Li, Q.1
Chang, E.C.2
Chan, M.C.3
-
12
-
-
0242456801
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
M. Mahoney and P. K. Chan, "Learning nonstationary models of normal network traffic for detecting novel attacks," in Proceedings of ACM 2002 SIGKDD, pp 376-385, 2002.
-
(2002)
Proceedings of ACM 2002 SIGKDD
, pp. 376-385
-
-
Mahoney, M.1
Chan, P.K.2
-
15
-
-
84904888755
-
Attacking DDoS at the source
-
Nov
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," in Proceedings of 10th IEEE International Conference on Network Protocols, pp. 312-321, Nov. 2002.
-
(2002)
Proceedings of 10th IEEE International Conference on Network Protocols
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
16
-
-
85084161486
-
Inferring internet denial-of-service activity
-
Aug
-
D. Moore, G. M. Voelker, and S. Savage, "Inferring internet denial-of-service activity," in Proceedings of 10th USENIX Security Symposium, pp. 9-22, Aug. 2001.
-
(2001)
Proceedings of 10th USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
18
-
-
84874961518
-
-
Top Layer Networks.
-
Top Layer Networks. (http://www.toplayer.com)
-
-
-
-
19
-
-
84874969314
-
-
Vsecure Technologies
-
Vsecure Technologies. (http://www.v-secure.com)
-
-
-
|