-
1
-
-
11144272176
-
A taxonomy of DDoS attack and DDoS denfense mechanisms
-
J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS denfense mechanisms, ACM SIGCOMM Computer Commun. Rev., vol. 34, no. 2, pp. 39-53, 2004.
-
(2004)
ACM SIGCOMM Computer Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
2
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, in Proc. 2005 Conference on Applications, Technologie, Architectures and Protocols for Computer Communications, pp. 217-228.
-
Proc. 2005 Conference on Applications, Technologie, Architectures and Protocols for Computer Communications
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
3
-
-
38149086666
-
Network anomaly detection using nonextensive entropy
-
A. Ziviani, A. Gomes, M. Monsores, and P. Rodrigues, Network anomaly detection using nonextensive entropy, IEEE Commun. Lett., vol. 11, no. 12, pp. 1034-1036, 2007.
-
(2007)
IEEE Commun. Lett.
, vol.11
, Issue.12
, pp. 1034-1036
-
-
Ziviani, A.1
Gomes, A.2
Monsores, M.3
Rodrigues, P.4
-
4
-
-
84862009854
-
DDoS flooding attack detection scheme based on F-divergence
-
H. Rahmani, N. Sahli, and F. Kamoun, DDoS flooding attack detection scheme based on F-divergence, Computer Commun., vol. 35, no. 11, pp. 1380-1391, 2012.
-
(2012)
Computer Commun.
, vol.35
, Issue.11
, pp. 1380-1391
-
-
Rahmani, H.1
Sahli, N.2
Kamoun, F.3
-
5
-
-
70350422660
-
Chaos theory based detection against network mimicking DDoS attacks
-
A. Chonka, J. Singh, and W. Zhou, Chaos theory based detection against network mimicking DDoS attacks, IEEE Commun. Lett., vol. 13, no. 9, pp. 717-719, 2009.
-
(2009)
IEEE Commun. Lett.
, vol.13
, Issue.9
, pp. 717-719
-
-
Chonka, A.1
Singh, J.2
Zhou, W.3
-
6
-
-
31544436627
-
Denial-ofservice attack-detection techniques
-
G. Carl, G. Kesidis, R. R. Brooks, R. Richard, and S. Rai, Denial-ofservice attack-detection techniques, Internet Computeing, vol. 10, no. 1, pp. 82-89, 2006.
-
(2006)
Internet Computeing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Richard, R.4
Rai, S.5
-
7
-
-
79551523280
-
Traceback of DDoS attacks using entropy variations
-
Mar.
-
S. Yu, W. Zhou, R. Doss, and W. Jia, Traceback of DDoS attacks using entropy variations, IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 3, pp. 412-425, Mar. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.3
, pp. 412-425
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Jia, W.4
-
8
-
-
79957530146
-
Low-rate DDoS attacks detection and traceback by using new information metrics
-
June
-
Y. Xiang, K. Li, and W. Zhou, Low-rate DDoS attacks detection and traceback by using new information metrics, IEEE Trans. Inf. Forensics and Security, vol. 6, no. 2, pp. 426-437, June 2011.
-
(2011)
IEEE Trans. Inf. Forensics and Security
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
9
-
-
84878708621
-
DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory
-
Y Chen, X. Ma, and X. Wu, DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory, IEEE Commun. Lett., vol. 17, no. 5, pp. 1052-1054, 2013.
-
(2013)
IEEE Commun. Lett.
, vol.17
, Issue.5
, pp. 1052-1054
-
-
Chen, Y.1
Ma, X.2
Wu, X.3
-
10
-
-
33646516485
-
Possible generalization of Boltzmann-Gibbs statistics
-
C. Tsallis, Possible generalization of Boltzmann-Gibbs statistics, J. Statistical Physics, vol. 52, no. 1-2, pp. 479-487, 1988.
-
(1988)
J. Statistical Physics
, vol.52
, Issue.1-2
, pp. 479-487
-
-
Tsallis, C.1
-
11
-
-
0000213709
-
Estimating the Lyapunovexponent spectrum from short time series of low precision
-
X. Zeng, R. Eykholt, and R. A. Pielke, Estimating the Lyapunovexponent spectrum from short time series of low precision, Physical Rev. Lett., vol. 66, no. 25, pp. 3229-3232, 1991.
-
(1991)
Physical Rev. Lett.
, vol.66
, Issue.25
, pp. 3229-3232
-
-
Zeng, X.1
Eykholt, R.2
Pielke, R.A.3
-
12
-
-
0242445762
-
The 1998 lincoln laboratory ids evaluation
-
Springer
-
J. McHugh, The 1998 Lincoln Laboratory IDS evaluation, in Recent Advances in Intrusion Deteciton. Springer, 2000, pp. 145-161.
-
(2000)
Recent Advances in Intrusion Deteciton.
, pp. 145-161
-
-
McHugh, J.1
-
13
-
-
56749110382
-
-
Available:
-
MIT Lincoln Lab (DDoS 1.0). Available: http://www.ll.mit.edu/IST/ideval/ data/2000/LLSDDOS1.0.html
-
MIT Lincoln Lab (DDoS 1.0).
-
-
|