메뉴 건너뛰기




Volumn , Issue , 2013, Pages 156-161

Detection of application layer DDoS attacks with clustering and bayes factors

Author keywords

Bayes factors; Clustering; Entropy; Http get attack; Intrusion detection

Indexed keywords

APPLICATION LAYERS; BAYES FACTOR; CLUSTERING; DDOS ATTACK; ENTROPY-BASED; HTTP PROTOCOLS; HTTP-GET ATTACK; WEB SESSIONS;

EID: 84893558615     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SMC.2013.34     Document Type: Conference Paper
Times cited : (13)

References (29)
  • 3
    • 84875966213 scopus 로고    scopus 로고
    • Detection of http-get attack with clustering and information theoretic measurements
    • In J. Garcia- Alfaro, F. Cuppens, N. Cuppens-Boulahia, A. Miri, and N. Tawbi, editors, volume 7743 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
    • P. Chwalinski, R. Belavkin, and X. Cheng. Detection of http-get attack with clustering and information theoretic measurements. In J. Garcia- Alfaro, F. Cuppens, N. Cuppens-Boulahia, A. Miri, and N. Tawbi, editors, Foundations and Practice of Security, volume 7743 of Lecture Notes in Computer Science, pages 45-61. Springer Berlin Heidelberg, 2013.
    • (2013) Foundations and Practice of Security , pp. 45-61
    • Chwalinski, P.1    Belavkin, R.2    Cheng, X.3
  • 5
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb
    • D. E. Denning. An intrusion-detection model. IEEE Trans. Softw. Eng., 13(2):222-232, Feb. 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 8
    • 34548254914 scopus 로고    scopus 로고
    • Cluster-wise assessment of cluster stability
    • September
    • C. Hennig. Cluster-wise assessment of cluster stability. Computational Statistics and Data Analysis, 52(1):258-271, September 2007.
    • (2007) Computational Statistics and Data Analysis , vol.52 , Issue.1 , pp. 258-271
    • Hennig, C.1
  • 13
    • 84964247755 scopus 로고    scopus 로고
    • Sequence-order-independent network profiling for detecting application layer ddos attacks
    • S. Lee, G. Kim, and S. Kim. Sequence-order-independent network profiling for detecting application layer ddos attacks. EURASIP Journal on Wireless Communications and Networking, 2011(1):50, 2011.
    • (2011) EURASIP Journal on Wireless Communications and Networking , vol.2011 , Issue.1 , pp. 50
    • Lee, S.1    Kim, G.2    Kim, S.3
  • 14
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • W. Lee and D. Xiang. Information-theoretic measures for anomaly detection. In IEEE Symposium on Security and Privacy, pages 130- 143, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 15
    • 0002727513 scopus 로고
    • Distance between sets
    • M. Levandowsky and D. Winter. Distance between sets. Nature, 234(5323):34-35, 1971.
    • (1971) Nature , vol.234 , Issue.5323 , pp. 34-35
    • Levandowsky, M.1    Winter, D.2
  • 22
    • 0442296744 scopus 로고    scopus 로고
    • A bayesian paradigm for designing intrusion detection systems
    • !ce:title.Computer Security and Statistics!/ce:title
    • S. L. Scott. A bayesian paradigm for designing intrusion detection systems. Computational Statistics & Data Analysis, 45(1):69 - 83, 2004. !ce:title.Computer Security and Statistics!/ce:title..
    • (2004) Computational Statistics & Data Analysis , vol.45 , Issue.1 , pp. 69-83
    • Scott, S.L.1
  • 24
    • 47249148481 scopus 로고    scopus 로고
    • Mitigating application-level denial of service attacks on web servers: A client-transparent approach
    • July, 15:1-15:49
    • M. Srivatsa, A. Iyengar, J. Yin, and L. Liu. Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Trans. Web, 2:15:1-15:49, July 2008.
    • (2008) ACM Trans. Web , vol.2
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3    Liu, L.4
  • 25
    • 84856441401 scopus 로고    scopus 로고
    • Unsupervised clustering of web sessions to detect malicious and non-malicious website users
    • D. Stevanovic, N. Vlajic, and A. An. Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users. Procedia CS, 5:123-131, 2011.
    • (2011) Procedia CS , vol.5 , pp. 123-131
    • Stevanovic, D.1    Vlajic, N.2    An, A.3
  • 26
    • 84875926244 scopus 로고    scopus 로고
    • Detection of malicious and nonmalicious website visitors using unsupervised neural network learning
    • D. Stevanovic, N. Vlajic, and A. An. Detection of malicious and nonmalicious website visitors using unsupervised neural network learning. Applied Soft Computing, 2012.
    • (2012) Applied Soft Computing
    • Stevanovic, D.1    Vlajic, N.2    An, A.3
  • 29
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer ddos attacks for popular websites
    • February
    • Y. Xie and S.-Z. Yu. Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw., 17:15-25, February 2009.
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , pp. 15-25
    • Xie, Y.1    Yu, S.-Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.