메뉴 건너뛰기




Volumn 39, Issue 7, 2013, Pages 2243-2251

Dynamic entropy based DoS attack detection method

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL OF SERVICE ATTACKS; DETECTION RATES; DYNAMIC-ENTROPY; ENTROPY-BASED; ENTROPY-BASED METHODS; INFORMATION ENTROPY; MALICIOUS TRAFFIC; NETWORK ANOMALIES;

EID: 84885603471     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2013.05.003     Document Type: Article
Times cited : (17)

References (20)
  • 1
    • 84885637369 scopus 로고    scopus 로고
    • Detecting denial of service by modeling web-sever behaviour
    • Luis Campo Giralte, Cristina Conde, Isaac Martin de Diego, and Enrique Cabello Detecting denial of service by modeling web-sever behaviour Comput Electr Eng 2012 < http://dx.doi.org/10.1016/j.compeleceng.2012.07.004 >
    • (2012) Comput Electr Eng
    • Giralte, L.C.1    Conde, C.2    De Diego, I.M.3    Cabello, E.4
  • 2
    • 84865637442 scopus 로고    scopus 로고
    • Intrusion detection using reduced-size RNN based on feature grouping
    • M. Sheikhan, Z. Jadidi, and A. Farrokhi Intrusion detection using reduced-size RNN based on feature grouping Neural Comput Appl 21 6 2012 1185 1190
    • (2012) Neural Comput Appl , vol.21 , Issue.6 , pp. 1185-1190
    • Sheikhan, M.1    Jadidi, Z.2    Farrokhi, A.3
  • 3
    • 84858698273 scopus 로고    scopus 로고
    • Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
    • Pedro Casas, Johan Mazel, and Philippe Owezarski Unsupervised network intrusion detection systems: detecting the unknown without knowledge Comput Commun 35 7 2012 772 783
    • (2012) Comput Commun , vol.35 , Issue.7 , pp. 772-783
    • Casas, P.1    Mazel, J.2    Owezarski, P.3
  • 4
    • 85015605825 scopus 로고    scopus 로고
    • Classification, clustering and intrusion detection system
    • Manish Joshi Classification, clustering and intrusion detection system Int J Eng Res Appl 2 2 2012 961 964
    • (2012) Int J Eng Res Appl , vol.2 , Issue.2 , pp. 961-964
    • Joshi, M.1
  • 5
    • 34250801472 scopus 로고    scopus 로고
    • A hybrid machine learning approach to network anomaly detection
    • Taeshik Shon, and Jongsub Moon A hybrid machine learning approach to network anomaly detection Inform Sci 177 18 2007 3799 3821
    • (2007) Inform Sci , vol.177 , Issue.18 , pp. 3799-3821
    • Shon, T.1    Moon, J.2
  • 6
    • 84885601013 scopus 로고    scopus 로고
    • Intrusion detection for wireless sensor network based on traffic prediction model
    • Han Zhijie, and Wang Ruchuang Intrusion detection for wireless sensor network based on traffic prediction model Phys Proc 25 2012 2072 2080
    • (2012) Phys Proc , vol.25 , pp. 2072-2080
    • Zhijie, H.1    Ruchuang, W.2
  • 7
    • 33947611595 scopus 로고    scopus 로고
    • Alive communication
    • Fogel Alan, and Garvey Andrea Alive communication Infant Behav Dev 30 2007 251 257
    • (2007) Infant Behav Dev , vol.30 , pp. 251-257
    • Alan, F.1    Andrea, G.2
  • 8
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot Mining anomalies using traffic feature distributions Comput Commun Rev 35 4 2005 217 228
    • (2005) Comput Commun Rev , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 11
    • 84861627481 scopus 로고    scopus 로고
    • Diagnosing traffic anomalies using a two-phase model
    • Bin Zhang, Jia-Hai Yang, Jian-Ping Wu, and Ying-Wu Zhu Diagnosing traffic anomalies using a two-phase model J Comput Sci Technol 27 2 2012 313 327
    • (2012) J Comput Sci Technol , vol.27 , Issue.2 , pp. 313-327
    • Zhang, B.1    Yang, J.-H.2    Wu, J.-P.3    Zhu, Y.-W.4
  • 12
    • 84867592401 scopus 로고    scopus 로고
    • Traffic anomaly detection using multi-dimensional entropy classification in backbone network
    • Zheng Liming, Zou Peng, Han Weihong, Li Aiping, and Jia Yan Traffic anomaly detection using multi-dimensional entropy classification in backbone network J Comput Res Dev 49 9 2012 1972 1981
    • (2012) J Comput Res Dev , vol.49 , Issue.9 , pp. 1972-1981
    • Liming, Z.1    Peng, Z.2    Weihong, H.3    Aiping, L.4    Yan, J.5
  • 14
    • 84873312171 scopus 로고    scopus 로고
    • Revealing network communities with a nonlinear programming method
    • Wenye Li Revealing network communities with a nonlinear programming method Inform Sci 229 2013 18 28
    • (2013) Inform Sci , vol.229 , pp. 18-28
    • Li, W.1
  • 16
    • 33748203405 scopus 로고    scopus 로고
    • A real-time anomaly detection model based on sampling measurement in a high-speed network
    • Guang Cheng, Jian Gong, and Wei Ding A real-time anomaly detection model based on sampling measurement in a high-speed network J Software 49 3 2003 594 599
    • (2003) J Software , vol.49 , Issue.3 , pp. 594-599
    • Cheng, G.1    Gong, J.2    Ding, W.3
  • 17
    • 69249222599 scopus 로고    scopus 로고
    • A TCAM-based solution for integrated traffic anomaly detection and policy filtering
    • Z.J. Wang, H. Che, J.N. Cao, and J.S. Wang A TCAM-based solution for integrated traffic anomaly detection and policy filtering Comput Commun 32 17 2009 1893 1901
    • (2009) Comput Commun , vol.32 , Issue.17 , pp. 1893-1901
    • Wang, Z.J.1    Che, H.2    Cao, J.N.3    Wang, J.S.4
  • 18
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Y. Xie, and S.Z. Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors IEEE ACM Trans Netw 17 1 2009 54 65
    • (2009) IEEE ACM Trans Netw , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Yu, S.Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.