메뉴 건너뛰기




Volumn 39, Issue 7, 2013, Pages 2252-2262

Detecting denial of service by modelling web-server behaviour

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS TIME; DDOS ATTACK; DENIAL OF SERVICE; DISTRIBUTED DENIAL OF SERVICE; HTTP TRAFFIC; REAL TRAFFIC; TRAFFIC FLOW; WEB SERVERS;

EID: 84885637369     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2012.07.004     Document Type: Article
Times cited : (40)

References (38)
  • 1
  • 2
    • 84885620562 scopus 로고    scopus 로고
    • [Dns-operations] lots of queries for txt records?
    • [Dns-operations] lots of queries for txt records?. < https://lists.dns-oarc.net/pipermail/dns-operations/2009-April/003779.html >; 2012.
    • (2012)
  • 4
    • 84885653098 scopus 로고    scopus 로고
    • Slowloris http dos. < http://ha.ckers.org/slowloris/ >; 2012.
    • (2012) Slowloris Http Dos
  • 5
    • 84885593344 scopus 로고    scopus 로고
    • Mitigating slowloris. < http://www.cert.org/blogs/certcc/2009/07/ slowloris-vs-your-webserver.html >; 2012.
    • (2012) Mitigating Slowloris
  • 8
    • 84885606766 scopus 로고    scopus 로고
    • Media temple network unavailability. < http://status.mediatemple.net/ weblog/category/system-incidents/1319-mt-media-temple-network-unavailability/ >; 2010.
    • (2010) Media Temple Network Unavailability
  • 12
    • 84885617255 scopus 로고    scopus 로고
    • 2012
    • Operation payback. < http://en.wikipedia.org/wiki/Operation-Payback >; 2012.
    • Operation Payback
  • 13
    • 84885652917 scopus 로고    scopus 로고
    • Low orbit ion cannon. < http://sourceforge.net/projects/loic/ >; 2012.
    • (2012) Low Orbit Ion Cannon
  • 14
    • 84885598935 scopus 로고    scopus 로고
    • Siege. < http://www.joedog.org/index/siege-home >; 2012.
    • (2012) Siege
  • 16
    • 62749197655 scopus 로고    scopus 로고
    • A multi-layered approach to botnet detection
    • H.R. Arabnia, S. Aissi, CSREA Press
    • R.F. Erbacher, A. Cutler, P. Banerjee, and J. Marshall A multi-layered approach to botnet detection H.R. Arabnia, S. Aissi, Security and Management 2008 CSREA Press 301 308
    • (2008) Security and Management , pp. 301-308
    • Erbacher, R.F.1    Cutler, A.2    Banerjee, P.3    Marshall, J.4
  • 17
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of ddos attacks over multiple network domains
    • Y. Chen, K. Hwang, and W.-S. Ku Collaborative detection of ddos attacks over multiple network domains IEEE Trans Parallel Distrib Sys 18 12 2007 1649 1662
    • (2007) IEEE Trans Parallel Distrib Sys , vol.18 , Issue.12 , pp. 1649-1662
    • Chen, Y.1    Hwang, K.2    Ku, W.-S.3
  • 18
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot Mining anomalies using traffic feature distributions SIGCOMM Comput Commun Rev 35 4 2005 217 228
    • (2005) SIGCOMM Comput Commun Rev , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 19
    • 33847743856 scopus 로고    scopus 로고
    • Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
    • K. Hwang, M. Cai, Y. Chen, and M. Qin Hybrid intrusion detection with weighted signature generation over anomalous internet episodes IEEE Trans Dependable Secur Comput 4 1 2007 41 55
    • (2007) IEEE Trans Dependable Secur Comput , vol.4 , Issue.1 , pp. 41-55
    • Hwang, K.1    Cai, M.2    Chen, Y.3    Qin, M.4
  • 23
    • 38549145516 scopus 로고    scopus 로고
    • Machine learning for automatic defence against distributed denial of service attacks
    • Seufert S, O'Brien D. Machine learning for automatic defence against distributed denial of service attacks. In: ICC, IEEE; 2007. p. 1217-22.
    • (2007) ICC, IEEE , pp. 1217-1222
    • Seufert, S.1    O'Brien, D.2
  • 24
    • 70350422660 scopus 로고    scopus 로고
    • Chaos theory based detection against network mimicking ddos attacks
    • A. Chonka, J. Singh, and W. Zhou Chaos theory based detection against network mimicking ddos attacks Comm Lett 13 9 2009 717 719
    • (2009) Comm Lett , vol.13 , Issue.9 , pp. 717-719
    • Chonka, A.1    Singh, J.2    Zhou, W.3
  • 25
    • 17444397467 scopus 로고    scopus 로고
    • Ddos attack detection and wavelets
    • L. Li, and G. Lee Ddos attack detection and wavelets Telecommun Sys 28 3-4 2005 435 451
    • (2005) Telecommun Sys , vol.28 , Issue.34 , pp. 435-451
    • Li, L.1    Lee, G.2
  • 26
    • 70350398963 scopus 로고    scopus 로고
    • Springer-Verlag Berlin, Heidelberg p. 273-284 [chapter detecting denial of service attacks in tor]
    • N. Danner, D. Krizanc, and M. Liberatore Financial cryptography and data security 2009 Springer-Verlag Berlin, Heidelberg p. 273-284 [chapter detecting denial of service attacks in tor]
    • (2009) Financial Cryptography and Data Security
    • Danner, N.1    Krizanc, D.2    Liberatore, M.3
  • 29
    • 27544465087 scopus 로고    scopus 로고
    • Detecting incoming and outgoing ddos attacks at the edge using a single set of network characteristics
    • IEEE Computer Society Washington, DC, USA
    • C. Siaterlis, and V. Maglaris Detecting incoming and outgoing ddos attacks at the edge using a single set of network characteristics Proceedings of the 10th IEEE Symposium on Computers and Communications 2005 IEEE Computer Society Washington, DC, USA 469 475
    • (2005) Proceedings of the 10th IEEE Symposium on Computers and Communications , pp. 469-475
    • Siaterlis, C.1    Maglaris, V.2
  • 30
    • 77950336949 scopus 로고    scopus 로고
    • Follow the (slash) dot: Effects of feedback on new members in an online community
    • M. Pendergast, K. Schmidt, G. Mark, M. Ackerman, ACM
    • C. Lampe, and E. Johnston Follow the (slash) dot: effects of feedback on new members in an online community M. Pendergast, K. Schmidt, G. Mark, M. Ackerman, GROUP 2005 ACM 11 20
    • (2005) GROUP , pp. 11-20
    • Lampe, C.1    Johnston, E.2
  • 31
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer ddos attacks for popular websites
    • Y. Xie, and S.-Z. Yu Monitoring the application-layer ddos attacks for popular websites IEEE/ACM Trans Netw 17 1 2009 15 25
    • (2009) IEEE/ACM Trans Netw , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2
  • 32
    • 67249100781 scopus 로고    scopus 로고
    • An automatic scheme to categorize user sessions in modern http traffic
    • Lin X, Quan L, Wu H. An automatic scheme to categorize user sessions in modern http traffic. In: GLOBECOM, IEEE; 2008. p. 1485-90.
    • (2008) GLOBECOM, IEEE , pp. 1485-1490
    • Lin, X.1    Quan, L.2    Wu, H.3
  • 33
    • 36849045127 scopus 로고    scopus 로고
    • Workload characterization of uncacheable http content
    • Munich, LNCS 3140. Springer [Caching over the Entire User-to-Data Path, 2003]
    • Zhu Z, Mao Y, Shi W. Workload characterization of uncacheable http content. In: Proceedings of International Conference on Web Engineering, Munich, LNCS 3140. Springer; 2004. p. 391-39 [Caching over the Entire User-to-Data Path, 2003].
    • (2004) Proceedings of International Conference on Web Engineering , pp. 391-439
    • Zhu, Z.1    Mao, Y.2    Shi, W.3
  • 35
    • 66749157109 scopus 로고    scopus 로고
    • Detecting pulsing denial-of-service attacks with nondeterministic attack intervals
    • X. Luo, E.W.W. Chan, and R.K.C. Chang Detecting pulsing denial-of-service attacks with nondeterministic attack intervals EURASIP J Adv Signal Process 2009 2009 8:1 8:13
    • (2009) EURASIP J Adv Signal Process , vol.2009 , pp. 81-813
    • Luo, X.1    Chan, E.W.W.2    Chang, R.K.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.