메뉴 건너뛰기




Volumn 24, Issue 7, 2013, Pages 1401-1410

Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior

Author keywords

attack detection; attack response; distributed denial of service attack; Traffic analysis; traffic modeling

Indexed keywords

ATTACK DETECTION; ATTACK RESPONSE; DISTRIBUTED DENIAL OF SERVICE ATTACK; TRAFFIC ANALYSIS; TRAFFIC MODELING;

EID: 84878500827     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.232     Document Type: Article
Times cited : (24)

References (33)
  • 2
    • 84864186488 scopus 로고    scopus 로고
    • Research on detection methods of CC attack
    • Z.L.C. Zhonghua and W. Xiaoming, "Research on Detection Methods of CC Attack," Telecomm. Science, pp. 62-65, 2009.
    • (2009) Telecomm. Science , pp. 62-65
    • Zhonghua, Z.L.C.1    Xiaoming, W.2
  • 3
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, and E. Vazquez, "Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges," Computers and Security, vol. 28, nos. 1/2, pp. 18-28, 2009.
    • (2009) Computers and Security , vol.28 , Issue.1-2 , pp. 18-28
    • Garcia-Teodoro, P.1    Diaz-Verdejo, J.2    MacIa-Fernandez, G.3    Vazquez, E.4
  • 5
    • 74149089478 scopus 로고    scopus 로고
    • Hidden semi-markov models
    • S. Yu, "Hidden Semi-Markov Models," Artificial Intelligence, vol. 174, no. 2, pp. 215-243, 2010.
    • (2010) Artificial Intelligence , vol.174 , Issue.2 , pp. 215-243
    • Yu, S.1
  • 6
    • 57049166467 scopus 로고    scopus 로고
    • Measuring the normality of web proxies behavior based on locality principles
    • Y. Xie and S. Yu, "Measuring the Normality of Web Proxies Behavior Based on Locality Principles," Network and Parallel Computing, vol. 5245, pp. 61-73, 2008.
    • (2008) Network and Parallel Computing , vol.5245 , pp. 61-73
    • Xie, Y.1    Yu, S.2
  • 7
    • 79957530146 scopus 로고    scopus 로고
    • Low-rate ddos attacks detection and traceback by using new information metrics
    • June
    • Y. Xiang, K. Li, and W. Zhou, "Low-Rate DDos Attacks Detection and Traceback by Using New Information Metrics," IEEE Trans. Information Forensics and Security, vol. 6, no. 2, pp. 426-437, June 2011.
    • (2011) IEEE Trans. Information Forensics and Security , vol.6 , Issue.2 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 8
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Y. Yu, K. Li, W. Zhou, and P. Li, "Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures," J. Network and Computer Applications, vol. 35, no. 3, pp. 867-880, 2012.
    • (2012) J. Network and Computer Applications , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 9
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network- based defense mechanisms countering the dos and ddos problems
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of Network- Based Defense Mechanisms Countering the Dos and DDos Problems," ACM Computing Surveys, vol. 39, no. 1, p. 3, 2007.
    • (2007) ACM Computing Surveys , vol.39 , Issue.1 , pp. 3
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 10
    • 78149435896 scopus 로고    scopus 로고
    • Mitigating application layer distributed denial of service attacks via effective trust management
    • Nov
    • J. Yu, C. Fang, L. Lu, and Z. Li, "Mitigating Application Layer Distributed Denial of Service Attacks via Effective Trust Management," IET Comm., vol. 4, no. 16, pp. 1952-1962, Nov. 2010.
    • (2010) IET Comm , vol.4 , Issue.16 , pp. 1952-1962
    • Yu, J.1    Fang, C.2    Lu, L.3    Li, Z.4
  • 11
    • 80052373792 scopus 로고    scopus 로고
    • An otp-based mechanism for defending application layer ddos attacks
    • X. Ye, W. Wen, Y. Ye, and Q. Cen, "An Otp-Based Mechanism for Defending Application Layer DDos Attacks," Applied Informatics and Comm., vol. 227, pp. 388-396, 2011.
    • (2011) Applied Informatics and Comm , vol.227 , pp. 388-396
    • Ye, X.1    Wen, W.2    Ye, Y.3    Cen, Q.4
  • 12
    • 84964247755 scopus 로고    scopus 로고
    • Sequence-order-independent network profiling for detecting application layer ddos attacks
    • S. Lee, G. Kim, and S. Kim, "Sequence-Order-Independent Network Profiling for Detecting Application Layer DDos Attacks," EURASIP J. Wireless Comm. and Networking, vol. 2011, no. 1, p. 50, 2011.
    • (2011) EURASIP J. Wireless Comm. and Networking , vol.2011 , Issue.1 , pp. 50
    • Lee, S.1    Kim, G.2    Kim, S.3
  • 13
    • 84860543902 scopus 로고    scopus 로고
    • Discriminating ddos attacks from flash crowds using flow correlation coefficient
    • June
    • S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, "Discriminating DDos Attacks from Flash Crowds Using Flow Correlation Coefficient," IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 6, pp. 1073-1080, June 2012.
    • (2012) IEEE Trans. Parallel and Distributed Systems , vol.23 , Issue.6 , pp. 1073-1080
    • Yu, S.1    Zhou, W.2    Jia, W.3    Guo, S.4    Xiang, Y.5    Tang, F.6
  • 15
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
    • Feb
    • Y. Xie and S. Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors," IEEE/ACM Trans. Networking, vol. 17, no. 1, pp. 54-65, Feb. 2009.
    • (2009) IEEE/ ACM Trans. Networking , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.2
  • 16
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer ddos attacks for popular websites
    • Feb
    • Y. Xie and S.-Z. Yu, "Monitoring the Application-Layer DDoS Attacks for Popular Websites," IEEE/ACM Trans. Networking, vol. 17, no. 1, pp. 15-25, Feb. 2009.
    • (2009) IEEE/ ACM Trans. Networking , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2
  • 17
    • 0022685753 scopus 로고
    • Continuously variable duration hidden Markov models for automatic speech recognition
    • S. Levinson, "Continuously Variable Duration Hidden Markov Models for Automatic Speech Recognition," Computer Speech and Language, vol. 1, no. 1, pp. 29-45, 1986. (Pubitemid 17552445)
    • (1986) Computer Speech and Language , vol.1 , Issue.1 , pp. 29-45
    • Levinson, S.E.1
  • 18
    • 0037278070 scopus 로고    scopus 로고
    • An efficient forward-backward algorithm for an explicit-duration hidden markov model
    • Jan
    • S.-Z. Yu and H. Kobayashi, "An Efficient Forward-Backward Algorithm for an Explicit-Duration Hidden Markov Model," IEEE Signal Processing Letters, vol. 10, no. 1, pp. 11-14, Jan. 2003.
    • (2003) IEEE Signal Processing Letters , vol.10 , Issue.1 , pp. 11-14
    • Yu, S.-Z.1    Kobayashi, H.2
  • 19
    • 67349258558 scopus 로고    scopus 로고
    • A new family of eighth-order iterative methods for solving nonlinear equations
    • W. Bi, Q. Wu, and H. Ren, "A New Family of Eighth-Order Iterative Methods for Solving Nonlinear Equations," Applied Math. and Computation, vol. 214, no. 1, pp. 236-245, 2009.
    • (2009) Applied Math. and Computation , vol.214 , Issue.1 , pp. 236-245
    • Bi, W.1    Wu, Q.2    Ren, H.3
  • 20
    • 21644435461 scopus 로고    scopus 로고
    • The locality principle
    • DOI 10.1145/1070838.1070856
    • P. Denning, "The Locality Principle," Comm. ACM, vol. 48, no. 7, pp. 19-24, 2005. (Pubitemid 40926361)
    • (2005) Communications of the ACM , vol.48 , Issue.7 , pp. 19-24
    • Denning, P.J.1
  • 23
    • 0034275825 scopus 로고    scopus 로고
    • Temporal locality and its impact on web proxy cache performance
    • A. Mahanti, D. Eager, and C. Williamson, "Temporal Locality and Its Impact on Web Proxy Cache Performance," Performance Evaluation, vol. 42, nos. 2/3, pp. 187-203, 2000.
    • (2000) Performance Evaluation , vol.42 , Issue.2-3 , pp. 187-203
    • Mahanti, A.1    Eager, D.2    Williamson, C.3
  • 30
    • 84878517795 scopus 로고    scopus 로고
    • Microsoft battling botnets for control of computers
    • Microsoft, "Battling Botnets for Control of Computers, "Microsoft Security Intelligence Report, vol. 9, 2010.
    • (2010) Microsoft Security Intelligence Report , vol.9
  • 31
    • 84878516381 scopus 로고    scopus 로고
    • "DoSHTTP," http://www.socketsoft.net/, 2013.
    • (2013) DoSHTTP
  • 32
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • Feb
    • L. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
    • (1989) Proc IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 33
    • 0014599202 scopus 로고
    • Maximum likelihood estimation of the parameters of the gamma distribution and their bias
    • S. Choi and R. Wette, "Maximum Likelihood Estimation of the Parameters of the Gamma Distribution and Their Bias," Technometrics, vol. 11, no. 4, pp. 683-690, 1969.
    • (1969) Technometrics , vol.11 , Issue.4 , pp. 683-690
    • Choi, S.1    Wette, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.