메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1038-1041

Application layer DDoS detection using clustering analysis

Author keywords

application; browsing behavior; cluster; ddos

Indexed keywords

BROWSING BEHAVIOR; CLUSTER; CLUSTERING ANALYSIS; DDOS; DISTRIBUTED DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE ATTACK; TRANSITION PROBABILITIES; USER BROWSING BEHAVIORS;

EID: 84880226113     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSNT.2012.6526103     Document Type: Conference Paper
Times cited : (20)

References (15)
  • 1
    • 84880212037 scopus 로고    scopus 로고
    • MyDoom virus. [Online]. Available
    • MyDoom virus. [Online]. Available: http://www. uscert. gov/cas/techalerts/TA04-028A. html
  • 2
    • 0038729330 scopus 로고    scopus 로고
    • Protection from distributed denial of service attacks using history-based ip filtering
    • May
    • T. Peng, K. R. mohanarao, and C. Leckie, "Protection from distributed denial of service attacks using history-based IP filtering, " in Proc. IEEE Int. Conf. Communications, May 2003, vol. 1, pp. 482-486.
    • (2003) Proc. IEEE Int. Conf. Communications , vol.1 , pp. 482-486
    • Peng, T.1    Mohanarao, K.R.2    Leckie, C.3
  • 3
    • 33845591142 scopus 로고    scopus 로고
    • Ddosresilient scheduling to counter application layer attacks under imperfect detection
    • Apr
    • S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, "DDoSresilient scheduling to counter application layer attacks under imperfect detection, " in Proc. IEEE INFOCOM, Apr. 2006
    • (2006) Proc. IEEE INFOCOM
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 5
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
    • FEBRUARY
    • Yi Xie, Shun-Zheng Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors, " in IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 1, FEBRUARY 2009
    • (2009) IEEE/ACM TRANSACTIONS on NETWORKING , vol.17 , Issue.1
    • Xie, Y.1    Yu, S.-Z.2
  • 7
    • 2942728016 scopus 로고    scopus 로고
    • Telling humans and computers apart automatically
    • February
    • L. von Ahn, M. Blum, and J. Langford, "Telling Humans and Computers Apart Automatically, " Communications of the ACM, vol. 47, no. 2, pp. 57-60, February 2004.
    • (2004) Communications of the ACM , vol.47 , Issue.2 , pp. 57-60
    • Von Ahn, L.1    Blum, M.2    Langford, J.3
  • 9
    • 84880232558 scopus 로고    scopus 로고
    • http://ita. ee. lbl. gov/html/contrib/EPA-HTTP. html
  • 10
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • August 21-26, Philadelphia, Pennsylvania, USA
    • Anukool Lakhina et al, "Mining Anomalies Using Traffic Feature Distributions", SIGCOMM'05, August 21-26, 2005, Philadelphia, Pennsylvania, USA
    • (2005) SIGCOMM'05
    • Lakhina, A.1
  • 12
    • 21844462588 scopus 로고    scopus 로고
    • Distributed denial of service detection using tcp/ip header and traffic measurement analysis
    • Sappoo, Japan, Oct. 26-29
    • L. Limwiwatkul and A. Rungsawangr, "Distributed denial of service detection using TCP/IP header and traffic measurement analysis, " in Proc. Int. Symp. Commun. Inf. Technol. , Sappoo, Japan, Oct. 26-29, 2004, pp. 605-610.
    • (2004) Proc. Int. Symp. Commun. Inf. Technol , pp. 605-610
    • Limwiwatkul, L.1    Rungsawangr, A.2
  • 15
    • 0013094103 scopus 로고    scopus 로고
    • How to explain hierarchical clustering
    • University of South Carolina
    • Stephen P. Borgatti, "How to Explain Hierarchical Clustering", 1994 INSNA, 17(2):78-80, University of South Carolina.
    • 1994 INSNA , vol.17 , Issue.2 , pp. 78-80
    • Borgatti, S.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.