-
1
-
-
0036804084
-
Defending against flooding-based distributed denialof-service attacks: A tutorial
-
Oct
-
R.K.C. Chang, "Defending against flooding-based distributed denialof-service attacks: a tutorial," Communications Magazine, IEEE , vol.40, no.10, pp.42-51, Oct 2002
-
(2002)
Communications Magazine, IEEE
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.C.1
-
2
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms". SIGCOMM Computer. Communication Review. vol 34, no. 2, 2004, pp, 39-53.
-
(2004)
SIGCOMM Computer. Communication Review
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
3
-
-
84871573565
-
An adaptive approach to network resilience: Evolving challenge detection and mitigation
-
10-12 Oct.
-
Y. Yu, M. Fry, A. Schaeffer-Filho, P. Smith and D. Hutchison, "An adaptive approach to network resilience: Evolving challenge detection and mitigation," 2011 8th International Workshop on the Design of Reliable Communication Networks (DRCN), pp.172-179, 10-12 Oct. 2011
-
(2011)
2011 8th International Workshop on the Design of Reliable Communication Networks (DRCN)
, pp. 172-179
-
-
Yu, Y.1
Fry, M.2
Schaeffer-Filho, A.3
Smith, P.4
Hutchison, D.5
-
4
-
-
79957530146
-
Low-rate ddos attacks detection and traceback by using new information metrics
-
June
-
Y. Xiang, K. Li, and W. Zhou, "Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics," Information Forensics and Security, IEEE Transactions on , vol.6, no.2, pp.426-437, June 2011
-
(2011)
Information Forensics and Security, IEEE Transactions on
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
7
-
-
33845584261
-
Collaborative change detection of ddos attacks on community and isp networks
-
14-17 May
-
Y. Chen and K. Hwang, "Collaborative Change Detection of DDoS Attacks on Community and ISP Networks". In Collaborative Technologies and Systems, 2006. CTS 2006, pp. 401-410, 14-17 May 2006
-
(2006)
Collaborative Technologies and Systems, 2006. CTS 2006
, pp. 401-410
-
-
Chen, Y.1
Hwang, K.2
-
8
-
-
80053049918
-
Visual clustering of spam emails for ddos analysis
-
13-15 July
-
M.L. Huang, J. Zhang, Q. V. Nguyen and J. Wang, "Visual Clustering of Spam Emails for DDoS Analysis," In Information Visualization, IV 2011, 15th International Conference on, pp.65-72, 13-15 July 2011
-
(2011)
Information Visualization, IV 2011, 15th International Conference on
, pp. 65-72
-
-
Huang, M.L.1
Zhang, J.2
Nguyen, Q.V.3
Wang, J.4
-
9
-
-
84893435123
-
Detecting ddos attack in spam emails using density-weight model
-
4-6 Nov
-
J. Zhang, M.L. Huang and D. Hoang, "Detecting DDoS Attack in Spam Emails using Density-Weight Model". In Proc, ICITIS 2011, 2011 2nd IEEE International Conference on Information Theory and Information Security, Hangzhou, China, pp.344-352, 4-6 Nov 2011
-
(2011)
Proc, ICITIS 2011, 2011 2nd IEEE International Conference on Information Theory and Information Security, Hangzhou, China
, pp. 344-352
-
-
Zhang, J.1
Huang, M.L.2
Hoang, D.3
-
10
-
-
50249185630
-
The early detection of ddos based on the persistent increment feature of the traffic volume
-
25-28 March
-
Y. Huang, X. Fu, Q. Hou and Z. Yu, "The Early Detection of DDoS Based on the Persistent Increment Feature of the Traffic Volume," In Proc, AINAW 2008, 22nd International Conference on Advanced Information Networking and Applications-Workshops, 2008, pp.365-370, 25-28 March 2008
-
(2008)
Proc, AINAW 2008, 22nd International Conference on Advanced Information Networking and Applications-Workshops, 2008
, pp. 365-370
-
-
Huang, Y.1
Fu, X.2
Hou, Q.3
Yu, Z.4
-
11
-
-
84859430323
-
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
-
May, ISSN 0167-4048
-
A. Shiravi, H. Shiravi, M. Tavallaee, and A.A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection," Computers & Security, Volume 31, Issue 3, May 2012, Pages 357-374, ISSN 0167-4048
-
(2012)
Computers & Security
, vol.31
, Issue.3
, pp. 357-374
-
-
Shiravi, A.1
Shiravi, H.2
Tavallaee, M.3
Ghorbani, A.A.4
-
12
-
-
0035361712
-
Network support for ip traceback
-
Jun
-
S. Savage, D. Wetherall, A. Karlin and T Anderson, "Network support for IP traceback," Networking, IEEE/ACM Transactions on , vol.9, no.3, pp.226-237, Jun 2001
-
(2001)
Networking, IEEE/ACM Transactions on
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
13
-
-
0006767318
-
Navigating clustered graphs using force-directed methods
-
July
-
P. Eades and M.L. Huang , "Navigating Clustered Graphs using Force-Directed Methods", Journal of Graph Algorithms and Applications, vol. 4 no. 3, pp 157-181, July, 2000.
-
(2000)
Journal of Graph Algorithms and Applications
, vol.4
, Issue.3
, pp. 157-181
-
-
Eades, P.1
Huang, M.L.2
-
14
-
-
84875287724
-
A space-optimized tree visualization
-
Q.V. Nguyen, M.L. Huang, "A space-optimized tree visualization," In Proc, INFOVIS '02, IEEE Symposium on Information Visualization, 2002, pp. 85-92
-
(2002)
Proc, INFOVIS '02, IEEE Symposium on Information Visualization
, pp. 85-92
-
-
Nguyen, Q.V.1
Huang, M.L.2
-
15
-
-
0038445134
-
High-speed router filter for blocking tcp flooding under ddos attack
-
9-11 April
-
Y. Kim, J.Y. Jo, H.J. Chao and F. Merat, "High-speed router filter for blocking TCP flooding under DDoS attack," In Proc, 2003 IEEE International Performance, Computing, and Communications Conference, pp. 183-190, 9-11 April 2003
-
(2003)
Proc, 2003 IEEE International Performance, Computing, and Communications Conference
, pp. 183-190
-
-
Kim, Y.1
Jo, J.Y.2
Chao, H.J.3
Merat, F.4
-
16
-
-
50049136062
-
Techniques and a framework for characterizing computer systems' workloads
-
Nov.
-
S. Elnaffar and P. Martin, "Techniques and a Framework for Characterizing Computer Systems' Workloads," Innovations in Information Technology, 2006, pp.1-5, Nov. 2006
-
(2006)
Innovations in Information Technology, 2006
, pp. 1-5
-
-
Elnaffar, S.1
Martin, P.2
-
17
-
-
33745683300
-
Integrating a performance model in self-managing computer systems under mixed workload conditions
-
15-17 Aug.
-
M. Nijim, T. Xie and X. Qin, "Integrating a performance model in self-managing computer systems under mixed workload conditions," In Proc, IRI 2005, IEEE International Conference on Information Reuse and Integration, 2005, pp. 132-137, 15-17 Aug. 2005
-
(2005)
Proc, IRI 2005, IEEE International Conference on Information Reuse and Integration, 2005
, pp. 132-137
-
-
Nijim, M.1
Xie, T.2
Qin, X.3
-
18
-
-
79952639890
-
Redesign of gridbased enterprise information network through servers consolidation
-
Nov. 30-Dec. 2
-
A.R. Abdulgafer, P.N. Marimuthu and S.J. Habib, "Redesign of gridbased enterprise information network through servers consolidation," In Proc, ICCIT 2010, 5th International Conference on Computer Sciences and Convergence Information Technology, pp.445-450, Nov. 30-Dec. 2 2010
-
(2010)
Proc, ICCIT 2010, 5th International Conference on Computer Sciences and Convergence Information Technology
, pp. 445-450
-
-
Abdulgafer, A.R.1
Marimuthu, P.N.2
Habib, S.J.3
-
19
-
-
4544322107
-
Assessing the robustness of selfmanaging computer systems under highly variable workloads
-
17-18 May
-
M.N. Bennani and D.A. Menasce, "Assessing the robustness of selfmanaging computer systems under highly variable workloads," In Proc, International Conference on Autonomic Computing, 2004, pp. 62-69, 17-18 May 2004
-
(2004)
Proc, International Conference on Autonomic Computing, 2004
, pp. 62-69
-
-
Bennani, M.N.1
Menasce, D.A.2
-
20
-
-
33749537123
-
Visualizing cyber attacks using ip matrix
-
H. Koike, K. Ohno, and K. Koizumi, "Visualizing cyber attacks using IP matrix," In Proc, VizSEC 05, IEEE Workshop on Visualization for Computer Security, 2005. pp. 91-98
-
(2005)
Proc, VizSEC 05, IEEE Workshop on Visualization for Computer Security
, pp. 91-98
-
-
Koike, H.1
Ohno, K.2
Koizumi, K.3
-
21
-
-
77954498471
-
Experimental study of ddos attacking of flood type based on ns2
-
M. Li, J. Li, and W. Zhao, "Experimental study of DDOS attacking of flood type based on NS2" International Journal of Electronics and Computers, vol. 1, no. 2, pp. 143, 2009.
-
(2009)
International Journal of Electronics and Computers
, vol.1
, Issue.2
, pp. 143
-
-
Li, M.1
Li, J.2
Zhao, W.3
-
22
-
-
37349125374
-
Ddos attack detection method using cluster analysis
-
April ISSN 0957-4174
-
K. Lee, J. Kim, K.H. Kwon, Y. Han and S. Kim, "DDoS attack detection method using cluster analysis", Expert Systems with Applications, Volume 34, Issue 3, April 2008, Pages 1659-1665, ISSN 0957-4174
-
(2008)
Expert Systems with Applications
, vol.34
, Issue.3
, pp. 1659-1665
-
-
Lee, K.1
Kim, J.2
Kwon, K.H.3
Han, Y.4
Kim, S.5
-
23
-
-
67650479255
-
Netviewer: A visualization tool for network security events
-
J. Zhang, P. Yang, L. Lu, and L. Chen, "NetViewer: A Visualization Tool for Network Security Events," In proc, NSWCTC '09. International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009, pp. 434-437
-
(2009)
Proc, NSWCTC '09. International Conference on Networks Security, Wireless Communications and Trusted Computing
, pp. 434-437
-
-
Zhang, J.1
Yang, P.2
Lu, L.3
Chen, L.4
-
24
-
-
84893478088
-
-
August
-
KDD Cup 1999. Available on http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, August 2010.
-
(2010)
KDD Cup 1999
-
-
-
25
-
-
0002000920
-
Denial-of-service attacks rip the internet
-
L. Garber, 'Denial-of-service attacks rip the Internet'. IEEE Computer, 2000, Vol 33, pp 12-17
-
(2000)
IEEE Computer
, vol.33
, pp. 12-17
-
-
Garber, L.1
-
26
-
-
0003375670
-
An analysis of using reflectors for distributed denial-ofservice attacks
-
July
-
V. Paxson, 'An analysis of using reflectors for distributed denial-ofservice attacks'. SIGCOMM Computer. Communication. Review. vol 31, issue 3, July 2001, pp.38-47
-
(2001)
SIGCOMM Computer. Communication. Review
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
-
27
-
-
20444495766
-
Portvis: A tool for port-based detection of security events
-
J. McPherson, K-L Ma, P. Krystosk, T. Bartoletti, and M. Christensen. "PortVis: a tool for port-based detection of security events". In Procc, VizSEC/DMSEC '04, 2004 ACM workshop on Visualization and data mining for computer security, 2004, pp.73-81
-
(2004)
Procc, VizSEC/DMSEC '04, 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 73-81
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
28
-
-
84904888755
-
Attacking ddos at the source
-
12-15 Nov.
-
J. Mirkovic, G. Prier and P. Reiher, "Attacking DDoS at the source," In Proc, 10th IEEE International Conference on Network Protocols, 2002, pp. 312-321, 12-15 Nov. 2002
-
(2002)
Proc, 10th IEEE International Conference on Network Protocols, 2002
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
29
-
-
84894589484
-
Monitoring large ip spaces with clockview
-
C. Kintzel, J. Fuchs, and F. Mansmann. "Monitoring large IP spaces with ClockView". In Proc, VizSec '11, 8th International Symposium on Visualization for Cyber Security. 2011 , pp.1-10
-
(2011)
Proc, VizSec '11, 8th International Symposium on Visualization for Cyber Security
, pp. 1-10
-
-
Kintzel, C.1
Fuchs, J.2
Mansmann, F.3
-
30
-
-
34247215073
-
Inetvis, a visual tool for network telescope traffic analysis
-
J-P. van Riel and B. Irwin. "InetVis, a visual tool for network telescope traffic analysis". In Proc, AFRIGRAPH '06. 4th international conference on Computer graphics, virtual reality, visualisation and interaction in Africa, 2006, pp.85-89.
-
(2006)
Proc, AFRIGRAPH '06. 4th International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa
, pp. 85-89
-
-
Van Riel, J.-P.1
Irwin, B.2
-
31
-
-
33749831619
-
Stackpi: New packet marking and filtering mechanisms for ddos and ip spoofing defense
-
Oct.
-
A. Yaar, A. Perrig and D. Song, "StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense," IEEE Journal on Selected Areas in Communications, vol.24, no.10, pp.1853-1863, Oct. 2006
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1853-1863
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
32
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
Feb
-
D.K.Y. Yau, J.C.S. Lui, F. Liang and Y. Yam, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles". IEEE/ACM Transaction on Networking. Vol.13, no.1,pp. 29-42, Feb 2005
-
(2005)
IEEE/ACM Transaction on Networking. Vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
-
33
-
-
20444484611
-
Nvisionip: Netflow visualizations of system state for security situational awareness
-
K. Lakkaraju, W. Yurcik, and A.J. Lee, "NVisionIP: netflow visualizations of system state for security situational awareness". In Proc, VizSEC/DMSEC '04, 2004 ACM workshop on Visualization and data mining for computer security. 2004, pp.65-72
-
(2004)
Proc, VizSEC/DMSEC '04, 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
34
-
-
55849145923
-
Using visualization techniques for snmp traffic analyses
-
6-9 July
-
E.M. Salvador and L.Z. Granville, "Using visualization techniques for SNMP traffic analyses," In Proc, ISCC 2008, IEEE Symposium on Computers and Communications, 2008, pp.806-811, 6-9 July 2008
-
(2008)
Proc, ISCC 2008, IEEE Symposium on Computers and Communications, 2008
, pp. 806-811
-
-
Salvador, E.M.1
Granville, L.Z.2
-
35
-
-
13944256121
-
Visflowconnect: Netflow visualizations of link relationships for security situational awareness
-
X. Yin, W. Yurcik, M. Treaster, Y. Li, and K. Lakkaraju. "VisFlowConnect: netflow visualizations of link relationships for security situational awareness". In Proc, VizSEC/DMSEC '04, 2004 ACM workshop on Visualization and data mining for computer security, 2440, pp.26-34
-
Proc, VizSEC/DMSEC '04, 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, vol.2440
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
-
36
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
R. Ball, G.A. Fink and C. North. "Home-centric visualization of network traffic for security administration". In Proc, VizSEC/DMSEC '04, 2004 ACM workshop on Visualization and data mining for computer security, 2004, pp.55-64
-
(2004)
Proc, VizSEC/DMSEC '04, 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
|