메뉴 건너뛰기




Volumn 38, Issue , 2014, Pages 36-46

Detection and defense of application-layer DDoS attacks in backbone web traffic

Author keywords

Backbone; DDoS attack; Model mining

Indexed keywords

DENIAL-OF-SERVICE ATTACK; FILTRATION; INTERNET; WEB SERVICES;

EID: 84901410507     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2013.08.002     Document Type: Article
Times cited : (100)

References (36)
  • 1
    • 61449135082 scopus 로고    scopus 로고
    • Monitoring the application-layer ddos attacks for popular websites
    • Y. Xie, and S. Zheng Yu Monitoring the application-layer ddos attacks for popular websites IEEE/ACM Trans. Netw. 17 1 2009 15 25
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 15-25
    • Xie, Y.1    Zheng Yu, S.2
  • 3
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Y. Xie, and S. Zheng Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors IEEE/ACM Trans. Netw. 17 1 2009 54 65
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 54-65
    • Xie, Y.1    Zheng Yu, S.2
  • 4
  • 9
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and ddos problems
    • T. Peng, C. Leckie, and K. Ramamohanarao Survey of network-based defense mechanisms countering the dos and ddos problems ACM Comput. Surv. 39 1 2007
    • (2007) ACM Comput. Surv. , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 10
    • 85028098285 scopus 로고    scopus 로고
    • Parametric methods for anomaly detection in aggregate traffic
    • G. Thatte, U. Mitra, and J. Heidemann Parametric methods for anomaly detection in aggregate traffic IEEE/ACM Trans. Netw. 19 2 2011 512 525
    • (2011) IEEE/ACM Trans. Netw. , vol.19 , Issue.2 , pp. 512-525
    • Thatte, G.1    Mitra, U.2    Heidemann, J.3
  • 11
    • 84878500827 scopus 로고    scopus 로고
    • Resisting web proxy-based http attacks by temporal and spatial locality behavior
    • Y. Xie, S. Tang, Y. Xiang, and J. Hu Resisting web proxy-based http attacks by temporal and spatial locality behavior IEEE Trans. Parallel Distrib. Syst. 24 7 2013 1401 1410
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.7 , pp. 1401-1410
    • Xie, Y.1    Tang, S.2    Xiang, Y.3    Hu, J.4
  • 12
    • 84867545952 scopus 로고    scopus 로고
    • A structural approach for modelling the hierarchical dynamic process of web workload in a large-scale campus network
    • Y. Xie, J. Hu, S. Tang, and X. Huang A structural approach for modelling the hierarchical dynamic process of web workload in a large-scale campus network J. Netw. Comput. Appl. 35 6 2012 2081 2091
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.6 , pp. 2081-2091
    • Xie, Y.1    Hu, J.2    Tang, S.3    Huang, X.4
  • 15
    • 84860543902 scopus 로고    scopus 로고
    • Discriminating ddos attacks from flash crowds using flow correlation coefficient
    • S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang Discriminating ddos attacks from flash crowds using flow correlation coefficient IEEE Trans. Parallel Distrib. Syst. 23 6 2012 1073 1080
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.23 , Issue.6 , pp. 1073-1080
    • Yu, S.1    Zhou, W.2    Jia, W.3    Guo, S.4    Xiang, Y.5    Tang, F.6
  • 16
    • 84862578082 scopus 로고    scopus 로고
    • Adaptive selective verification: An efficient adaptive countermeasure to thwart dos attacks
    • S. Khanna, S.S. Venkatesh, O. Fatemieh, F. Khan, and C.A. Gunter Adaptive selective verification: an efficient adaptive countermeasure to thwart dos attacks IEEE/ACM Trans. Netw. 20 3 2012 715 728
    • (2012) IEEE/ACM Trans. Netw. , vol.20 , Issue.3 , pp. 715-728
    • Khanna, S.1    Venkatesh, S.S.2    Fatemieh, O.3    Khan, F.4    Gunter, C.A.5
  • 17
  • 19
    • 4444317270 scopus 로고    scopus 로고
    • Defending against an internet-based attack on the physical world
    • S. Byers, A.D. Rubin, and D. Kormann Defending against an internet-based attack on the physical world ACM Trans. Internet Technol. 4 3 2004 239 254
    • (2004) ACM Trans. Internet Technol. , vol.4 , Issue.3 , pp. 239-254
    • Byers, S.1    Rubin, A.D.2    Kormann, D.3
  • 21
    • 47149094655 scopus 로고    scopus 로고
    • A detection and offense mechanism to defend against application layer DDoS attacks
    • ICNS'07 IEEE Computer Society Washington, DC, USA
    • J. Yu, Z. Li, H. Chen, and X. Chen A detection and offense mechanism to defend against application layer DDoS attacks Proceedings of the Third International Conference on Networking and Services ICNS'07 2007 IEEE Computer Society Washington, DC, USA 54 66
    • (2007) Proceedings of the Third International Conference on Networking and Services , pp. 54-66
    • Yu, J.1    Li, Z.2    Chen, H.3    Chen, X.4
  • 23
    • 47249148481 scopus 로고    scopus 로고
    • Mitigating application-level denial of service attacks on web servers: A client-transparent approach
    • M. Srivatsa, A. Iyengar, J. Yin, and L. Liu Mitigating application-level denial of service attacks on web servers: a client-transparent approach ACM Trans. Web 2 3 2008 1 49
    • (2008) ACM Trans. Web , vol.2 , Issue.3 , pp. 1-49
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3    Liu, L.4
  • 25
    • 0031383380 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic: Evidence and possible causes
    • PII S1063669297087827
    • M.E. Crovella, and A. Bestavros Self-similarity in world wide web traffic: evidence and possible causes IEEE/ACM Trans. Netw. 5 6 1997 835 846 (Pubitemid 127768491)
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.6 , pp. 835-846
    • Crovella, M.E.1    Bestavros, A.2
  • 29
    • 67349164787 scopus 로고    scopus 로고
    • Processing intrusion detection alert aggregates with time series modeling
    • J. Viinikka, H. Debar, L. Mé, A. Lehikoinen, and M. Tarvainen Processing intrusion detection alert aggregates with time series modeling Information Fusion 10 4 2009 312 324
    • (2009) Information Fusion , vol.10 , Issue.4 , pp. 312-324
    • Viinikka, J.1    Debar, H.2    Mé, L.3    Lehikoinen, A.4    Tarvainen, M.5
  • 30
    • 59949095579 scopus 로고    scopus 로고
    • Network anomaly detection based on wavelet analysis
    • W. Lu, and A.A. Ghorbani Network anomaly detection based on wavelet analysis EURASIP J. Adv. Signal Process. 4 2009 1 16
    • (2009) EURASIP J. Adv. Signal Process. , vol.4 , pp. 1-16
    • Lu, W.1    Ghorbani, A.A.2
  • 33
  • 35
    • 0035015894 scopus 로고    scopus 로고
    • Using multiple hash functions to improve ip lookups
    • IEEE
    • M. Mitzenmacher, and A. Broder Using multiple hash functions to improve ip lookups IN Proceedings of IEEE INFOCOM 2000 IEEE 1454 1463
    • (2000) Proceedings of IEEE INFOCOM , pp. 1454-1463
    • Mitzenmacher, M.1    Broder, A.2
  • 36
    • 84893321707 scopus 로고    scopus 로고
    • Network applications of bloom filters: A survey
    • A. Broder, and M. Mitzenmacher Network applications of bloom filters: A survey Internet Math. 2002 636 646
    • (2002) Internet Math. , pp. 636-646
    • Broder, A.1    Mitzenmacher, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.