메뉴 건너뛰기




Volumn 25, Issue 2, 2014, Pages 447-456

A system for denial-of-service attack detection based on multivariate correlation analysis

Author keywords

Denial of service attack; multivariate correlations; network traffic characterization; triangle area

Indexed keywords

ANOMALY BASED DETECTION; DATA-BASE SERVERS; DENIAL OF SERVICE ATTACKS; DETECTION ACCURACY; MULTIVARIATE CORRELATION; NETWORK TRAFFIC CHARACTERIZATIONS; STATE-OF-THE-ART APPROACH; TRIANGLE AREAS;

EID: 84891816613     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2013.146     Document Type: Article
Times cited : (256)

References (22)
  • 1
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time, Computer Networks, vol. 31, pp. 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 3
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb
    • D.E. Denning, An Intrusion-Detection Model, IEEE Trans. Software Eng., vol. TSE-13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.TSE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 4
    • 37349125374 scopus 로고    scopus 로고
    • DDoS attack detection method using cluster analysis
    • DOI 10.1016/j.eswa.2007.01.040, PII S0957417407000395
    • K. Lee, J. Kim, K.H. Kwon, Y. Han, and S. Kim, DDoS Attack Detection Method Using Cluster Analysis, Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008. (Pubitemid 350298194)
    • (2008) Expert Systems with Applications , vol.34 , Issue.3 , pp. 1659-1665
    • Lee, K.1    Kim, J.2    Kwon, K.H.3    Han, Y.4    Kim, S.5
  • 5
    • 58549089680 scopus 로고    scopus 로고
    • Intrusion detection using fuzzy association rules
    • A. Tajbakhsh, M. Rahmati, and A. Mirzaei, Intrusion Detection Using Fuzzy Association Rules, Applied Soft Computing, vol. 9, no. 2, pp. 462-469, 2009.
    • (2009) Applied Soft Computing , vol.9 , Issue.2 , pp. 462-469
    • Tajbakhsh, A.1    Rahmati, M.2    Mirzaei, A.3
  • 6
    • 84954358597 scopus 로고    scopus 로고
    • Traffic flooding attack detection with snmp mib using svm
    • J. Yu, H. Lee, M.-S. Kim, and D. Park, Traffic Flooding Attack Detection with SNMP MIB Using SVM, Computer Comm., vol. 31, no. 17, pp. 4212-4219, 2008.
    • (2008) Computer Comm. , vol.31 , Issue.17 , pp. 4212-4219
    • Yu, J.1    Lee, H.2    Kim, M.-S.3    Park, D.4
  • 8
    • 36348929372 scopus 로고    scopus 로고
    • Collaborative detection of ddos attacks over multiple network domains
    • Dec
    • C. Yu, H. Kai, and K. Wei-Shinn, Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, Dec. 2007.
    • (2007) IEEE Trans. Parallel and Distributed Systems , vol.18 , Issue.12 , pp. 1649-1662
    • Yu, C.1    Kai, H.2    Wei-Shinn, K.3
  • 9
    • 85028098285 scopus 로고    scopus 로고
    • Parametric methods for anomaly detection in aggregate traffic
    • Ar
    • G. Thatte, U. Mitra, and J. Heidemann, Parametric Methods for Anomaly Detection in Aggregate Traffic, IEEE/ACM Trans. Networking, vol. 19, no. 2, pp. 512-525, Apr. 2011.
    • (2011) IEEE/ACM Trans. Networking , vol.19 , Issue.2 , pp. 512-525
    • Thatte, G.1    Mitra, U.2    Heidemann, J.3
  • 11
    • 84860543902 scopus 로고    scopus 로고
    • Discriminating ddos attacks from flash crowds using flow correlation coefficient
    • June
    • S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient, IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 6, pp. 1073-1080, June 2012.
    • (2012) IEEE Trans. Parallel and Distributed Systems , vol.23 , Issue.6 , pp. 1073-1080
    • Yu, S.1    Zhou, W.2    Jia, W.3    Guo, S.4    Xiang, Y.5    Tang, F.6
  • 12
    • 34147111253 scopus 로고    scopus 로고
    • Network intrusion detection in covariance feature space
    • DOI 10.1016/j.patcog.2006.12.010, PII S0031320306005310
    • S. Jin, D.S. Yeung, and X. Wang, Network Intrusion Detection in Covariance Feature Space, Pattern Recognition, vol. 40, pp. 2185-2197, 2007. (Pubitemid 46574766)
    • (2007) Pattern Recognition , vol.40 , Issue.8 , pp. 2185-2197
    • Jin, S.1    Yeung, D.S.2    Wang, X.3
  • 13
    • 68949161842 scopus 로고    scopus 로고
    • A triangle area based nearest neighbors approach to intrusion detection
    • C.F. Tsai and C.Y. Lin, A Triangle Area Based Nearest Neighbors Approach to Intrusion Detection, Pattern Recognition, vol. 43, pp. 222-229, 2010.
    • (2010) Pattern Recognition , vol.43 , pp. 222-229
    • Tsai, C.F.1    Lin, C.Y.2
  • 14
    • 84875222968 scopus 로고    scopus 로고
    • Repids: A multi tier real-time payload-based intrusion detection system
    • A. Jamdagni, Z. Tan, X. He, P. Nanda, and R.P. Liu, RePIDS: A Multi Tier Real-Time Payload-Based Intrusion Detection System, Computer Networks, vol. 57, pp. 811-824, 2013.
    • (2013) Computer Networks , vol.57 , pp. 811-824
    • Jamdagni, A.1    Tan, Z.2    He, X.3    Nanda, P.4    Liu, R.P.5
  • 18
    • 0032163280 scopus 로고    scopus 로고
    • Quickest detection of abrupt changes for a class of random processes
    • PII S0018944898051244
    • G.V. Moustakides, Quickest Detection of Abrupt Changes for a Class of random Processes, IEEE Trans. Information Theory, vol. 44, no. 5, pp. 1965-1968, Sept. 1998. (Pubitemid 128738566)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1965-1968
    • Moustakides, G.V.1
  • 19
    • 8744295684 scopus 로고    scopus 로고
    • Distributed change detection for worms, ddos and other network attacks
    • A.A. Cardenas, J.S. Baras, and V. Ramezani, Distributed Change Detection for Worms, DDoS and Other Network Attacks, Proc. The Am. Control Conf., vol. 2, pp. 1008-1013, 2004.
    • (2004) Proc the Am. Control Conf. , vol.2 , pp. 1008-1013
    • Cardenas, A.A.1    Baras, J.S.2    Ramezani, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.