메뉴 건너뛰기




Volumn , Issue , 2013, Pages 277-284

Visual analytics model for intrusion detection in flood attack

Author keywords

attack density; attack scale; DDoS flood attack; information visualization; Network security; workload

Indexed keywords

ATTACK SCALE; DISTRIBUTED DENIAL OF SERVICE ATTACK; FLOOD ATTACKS; INFORMATION VISUALIZATION; INTRUSION DETECTION SYSTEMS; SYSTEM CAPABILITIES; VISUAL ANALYTICS; WORKLOAD;

EID: 84893491079     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2013.38     Document Type: Conference Paper
Times cited : (9)

References (36)
  • 1
    • 0036804084 scopus 로고    scopus 로고
    • Defending against flooding-based distributed denialof-service attacks: A tutorial
    • Oct
    • R.K.C. Chang, "Defending against flooding-based distributed denialof-service attacks: a tutorial," Communications Magazine, IEEE , vol.40, no.10, pp.42-51, Oct 2002
    • (2002) Communications Magazine, IEEE , vol.40 , Issue.10 , pp. 42-51
    • Chang, R.K.C.1
  • 2
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defense mechanisms". SIGCOMM Computer. Communication Review. vol 34, no. 2, 2004, pp, 39-53.
    • (2004) SIGCOMM Computer. Communication Review , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 4
    • 79957530146 scopus 로고    scopus 로고
    • Low-rate ddos attacks detection and traceback by using new information metrics
    • June
    • Y. Xiang, K. Li, and W. Zhou, "Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics," Information Forensics and Security, IEEE Transactions on , vol.6, no.2, pp.426-437, June 2011
    • (2011) Information Forensics and Security, IEEE Transactions on , vol.6 , Issue.2 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 7
    • 33845584261 scopus 로고    scopus 로고
    • Collaborative change detection of ddos attacks on community and isp networks
    • 14-17 May
    • Y. Chen and K. Hwang, "Collaborative Change Detection of DDoS Attacks on Community and ISP Networks". In Collaborative Technologies and Systems, 2006. CTS 2006, pp. 401-410, 14-17 May 2006
    • (2006) Collaborative Technologies and Systems, 2006. CTS 2006 , pp. 401-410
    • Chen, Y.1    Hwang, K.2
  • 11
    • 84859430323 scopus 로고    scopus 로고
    • Toward developing a systematic approach to generate benchmark datasets for intrusion detection
    • May, ISSN 0167-4048
    • A. Shiravi, H. Shiravi, M. Tavallaee, and A.A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection," Computers & Security, Volume 31, Issue 3, May 2012, Pages 357-374, ISSN 0167-4048
    • (2012) Computers & Security , vol.31 , Issue.3 , pp. 357-374
    • Shiravi, A.1    Shiravi, H.2    Tavallaee, M.3    Ghorbani, A.A.4
  • 13
    • 0006767318 scopus 로고    scopus 로고
    • Navigating clustered graphs using force-directed methods
    • July
    • P. Eades and M.L. Huang , "Navigating Clustered Graphs using Force-Directed Methods", Journal of Graph Algorithms and Applications, vol. 4 no. 3, pp 157-181, July, 2000.
    • (2000) Journal of Graph Algorithms and Applications , vol.4 , Issue.3 , pp. 157-181
    • Eades, P.1    Huang, M.L.2
  • 16
    • 50049136062 scopus 로고    scopus 로고
    • Techniques and a framework for characterizing computer systems' workloads
    • Nov.
    • S. Elnaffar and P. Martin, "Techniques and a Framework for Characterizing Computer Systems' Workloads," Innovations in Information Technology, 2006, pp.1-5, Nov. 2006
    • (2006) Innovations in Information Technology, 2006 , pp. 1-5
    • Elnaffar, S.1    Martin, P.2
  • 19
    • 4544322107 scopus 로고    scopus 로고
    • Assessing the robustness of selfmanaging computer systems under highly variable workloads
    • 17-18 May
    • M.N. Bennani and D.A. Menasce, "Assessing the robustness of selfmanaging computer systems under highly variable workloads," In Proc, International Conference on Autonomic Computing, 2004, pp. 62-69, 17-18 May 2004
    • (2004) Proc, International Conference on Autonomic Computing, 2004 , pp. 62-69
    • Bennani, M.N.1    Menasce, D.A.2
  • 21
    • 77954498471 scopus 로고    scopus 로고
    • Experimental study of ddos attacking of flood type based on ns2
    • M. Li, J. Li, and W. Zhao, "Experimental study of DDOS attacking of flood type based on NS2" International Journal of Electronics and Computers, vol. 1, no. 2, pp. 143, 2009.
    • (2009) International Journal of Electronics and Computers , vol.1 , Issue.2 , pp. 143
    • Li, M.1    Li, J.2    Zhao, W.3
  • 22
    • 37349125374 scopus 로고    scopus 로고
    • Ddos attack detection method using cluster analysis
    • April ISSN 0957-4174
    • K. Lee, J. Kim, K.H. Kwon, Y. Han and S. Kim, "DDoS attack detection method using cluster analysis", Expert Systems with Applications, Volume 34, Issue 3, April 2008, Pages 1659-1665, ISSN 0957-4174
    • (2008) Expert Systems with Applications , vol.34 , Issue.3 , pp. 1659-1665
    • Lee, K.1    Kim, J.2    Kwon, K.H.3    Han, Y.4    Kim, S.5
  • 24
    • 84893478088 scopus 로고    scopus 로고
    • August
    • KDD Cup 1999. Available on http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, August 2010.
    • (2010) KDD Cup 1999
  • 25
    • 0002000920 scopus 로고    scopus 로고
    • Denial-of-service attacks rip the internet
    • L. Garber, 'Denial-of-service attacks rip the Internet'. IEEE Computer, 2000, Vol 33, pp 12-17
    • (2000) IEEE Computer , vol.33 , pp. 12-17
    • Garber, L.1
  • 26
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-ofservice attacks
    • July
    • V. Paxson, 'An analysis of using reflectors for distributed denial-ofservice attacks'. SIGCOMM Computer. Communication. Review. vol 31, issue 3, July 2001, pp.38-47
    • (2001) SIGCOMM Computer. Communication. Review , vol.31 , Issue.3 , pp. 38-47
    • Paxson, V.1
  • 31
    • 33749831619 scopus 로고    scopus 로고
    • Stackpi: New packet marking and filtering mechanisms for ddos and ip spoofing defense
    • Oct.
    • A. Yaar, A. Perrig and D. Song, "StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense," IEEE Journal on Selected Areas in Communications, vol.24, no.10, pp.1853-1863, Oct. 2006
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1853-1863
    • Yaar, A.1    Perrig, A.2    Song, D.3
  • 32
    • 15544363902 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • Feb
    • D.K.Y. Yau, J.C.S. Lui, F. Liang and Y. Yam, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles". IEEE/ACM Transaction on Networking. Vol.13, no.1,pp. 29-42, Feb 2005
    • (2005) IEEE/ACM Transaction on Networking. Vol.13 , Issue.1 , pp. 29-42
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3    Yam, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.