-
1
-
-
61449135082
-
Monitoring the application-layer ddos attacks for popular websites
-
Y. Xie, and S. Zheng Yu Monitoring the application-layer ddos attacks for popular websites IEEE/ACM Trans. Netw. 17 1 2009 15 25
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Zheng Yu, S.2
-
3
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Y. Xie, and S. Zheng Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors IEEE/ACM Trans. Netw. 17 1 2009 54 65
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Zheng Yu, S.2
-
4
-
-
35248831179
-
Captcha: Using hard ai problems for security
-
L. von Ahn, M. Blum, N.J. Hopper, J. Langford, Captcha: using hard ai problems for security, in: EUROCRYPT, 2003, pp. 294-311.
-
(2003)
EUROCRYPT
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
5
-
-
84924375780
-
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds
-
NSDI'05 USENIX Association Berkeley, CA, USA
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger Botz-4-sale: surviving organized ddos attacks that mimic flash crowds Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation NSDI'05 2005 USENIX Association Berkeley, CA, USA 287 300
-
(2005)
Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation
, pp. 287-300
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
6
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
IMW '02 ACM New York, NY, USA
-
P. Barford, J. Kline, D. Plonka, and A. Ron A signal analysis of network traffic anomalies Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement IMW '02 2002 ACM New York, NY, USA 71 82
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
7
-
-
77950831788
-
Ddos defense by offense
-
M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker Ddos defense by offense ACM Trans. Comput. Syst. 28 1 2010 1 54
-
(2010)
ACM Trans. Comput. Syst.
, vol.28
, Issue.1
, pp. 1-54
-
-
Walfish, M.1
Vutukuru, M.2
Balakrishnan, H.3
Karger, D.4
Shenker, S.5
-
8
-
-
33845591142
-
Ddos-resilient scheduling to counter application layer attacks under imperfect detection
-
S. Ranjan, R. Swaminathan, M. Uysal, E. Knightly, Ddos-resilient scheduling to counter application layer attacks under imperfect detection, in: Proceedings. INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006, pp. 1-13.
-
(2006)
Proceedings. INFOCOM 2006. 25th IEEE International Conference on Computer Communications
, pp. 1-13
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
9
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
T. Peng, C. Leckie, and K. Ramamohanarao Survey of network-based defense mechanisms countering the dos and ddos problems ACM Comput. Surv. 39 1 2007
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
10
-
-
85028098285
-
Parametric methods for anomaly detection in aggregate traffic
-
G. Thatte, U. Mitra, and J. Heidemann Parametric methods for anomaly detection in aggregate traffic IEEE/ACM Trans. Netw. 19 2 2011 512 525
-
(2011)
IEEE/ACM Trans. Netw.
, vol.19
, Issue.2
, pp. 512-525
-
-
Thatte, G.1
Mitra, U.2
Heidemann, J.3
-
11
-
-
84878500827
-
Resisting web proxy-based http attacks by temporal and spatial locality behavior
-
Y. Xie, S. Tang, Y. Xiang, and J. Hu Resisting web proxy-based http attacks by temporal and spatial locality behavior IEEE Trans. Parallel Distrib. Syst. 24 7 2013 1401 1410
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.7
, pp. 1401-1410
-
-
Xie, Y.1
Tang, S.2
Xiang, Y.3
Hu, J.4
-
12
-
-
84867545952
-
A structural approach for modelling the hierarchical dynamic process of web workload in a large-scale campus network
-
Y. Xie, J. Hu, S. Tang, and X. Huang A structural approach for modelling the hierarchical dynamic process of web workload in a large-scale campus network J. Netw. Comput. Appl. 35 6 2012 2081 2091
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.6
, pp. 2081-2091
-
-
Xie, Y.1
Hu, J.2
Tang, S.3
Huang, X.4
-
14
-
-
0033651981
-
On network-aware clustering of web clients
-
SIGCOMM'00 ACM New York, NY, USA
-
B. Krishnamurthy, and J. Wang On network-aware clustering of web clients Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication SIGCOMM'00 2000 ACM New York, NY, USA 97 110
-
(2000)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 97-110
-
-
Krishnamurthy, B.1
Wang, J.2
-
15
-
-
84860543902
-
Discriminating ddos attacks from flash crowds using flow correlation coefficient
-
S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang Discriminating ddos attacks from flash crowds using flow correlation coefficient IEEE Trans. Parallel Distrib. Syst. 23 6 2012 1073 1080
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.6
, pp. 1073-1080
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Xiang, Y.5
Tang, F.6
-
16
-
-
84862578082
-
Adaptive selective verification: An efficient adaptive countermeasure to thwart dos attacks
-
S. Khanna, S.S. Venkatesh, O. Fatemieh, F. Khan, and C.A. Gunter Adaptive selective verification: an efficient adaptive countermeasure to thwart dos attacks IEEE/ACM Trans. Netw. 20 3 2012 715 728
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.3
, pp. 715-728
-
-
Khanna, S.1
Venkatesh, S.S.2
Fatemieh, O.3
Khan, F.4
Gunter, C.A.5
-
17
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
WWW'02 ACM New York, NY, USA
-
J. Jung, B. Krishnamurthy, and M. Rabinovich Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites Proceedings of the 11th International Conference on World Wide Web WWW'02 2002 ACM New York, NY, USA 293 304
-
(2002)
Proceedings of the 11th International Conference on World Wide Web
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
18
-
-
79952905384
-
Detection of http flooding attacks in multiple scenarios
-
ICCCS'11 ACM New York, NY, USA
-
D. Das, U. Sharma, and D.K. Bhattacharyya Detection of http flooding attacks in multiple scenarios Proceedings of the 2011 International Conference on Communication, Computing and Security ICCCS'11 2011 ACM New York, NY, USA 517 522
-
(2011)
Proceedings of the 2011 International Conference on Communication, Computing and Security
, pp. 517-522
-
-
Das, D.1
Sharma, U.2
Bhattacharyya, D.K.3
-
19
-
-
4444317270
-
Defending against an internet-based attack on the physical world
-
S. Byers, A.D. Rubin, and D. Kormann Defending against an internet-based attack on the physical world ACM Trans. Internet Technol. 4 3 2004 239 254
-
(2004)
ACM Trans. Internet Technol.
, vol.4
, Issue.3
, pp. 239-254
-
-
Byers, S.1
Rubin, A.D.2
Kormann, D.3
-
20
-
-
47349116678
-
Detection of http-get flood attack based on analysis of page access behavior
-
T. Yatagai, T. Isohara, I. Sasase, Detection of http-get flood attack based on analysis of page access behavior, in: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2007, pp. 232-235.
-
(2007)
IEEE Pacific Rim Conference on Communications, Computers and Signal Processing
, pp. 232-235
-
-
Yatagai, T.1
Isohara, T.2
Sasase, I.3
-
21
-
-
47149094655
-
A detection and offense mechanism to defend against application layer DDoS attacks
-
ICNS'07 IEEE Computer Society Washington, DC, USA
-
J. Yu, Z. Li, H. Chen, and X. Chen A detection and offense mechanism to defend against application layer DDoS attacks Proceedings of the Third International Conference on Networking and Services ICNS'07 2007 IEEE Computer Society Washington, DC, USA 54 66
-
(2007)
Proceedings of the Third International Conference on Networking and Services
, pp. 54-66
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
-
23
-
-
47249148481
-
Mitigating application-level denial of service attacks on web servers: A client-transparent approach
-
M. Srivatsa, A. Iyengar, J. Yin, and L. Liu Mitigating application-level denial of service attacks on web servers: a client-transparent approach ACM Trans. Web 2 3 2008 1 49
-
(2008)
ACM Trans. Web
, vol.2
, Issue.3
, pp. 1-49
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
Liu, L.4
-
25
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
PII S1063669297087827
-
M.E. Crovella, and A. Bestavros Self-similarity in world wide web traffic: evidence and possible causes IEEE/ACM Trans. Netw. 5 6 1997 835 846 (Pubitemid 127768491)
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
28
-
-
84901610680
-
-
Tech. Rep., Sprint Labs
-
A. Sharad, D. Travis, T. Christos, Ddos mitigation via regional cleaning centers, Tech. Rep., Sprint Labs, 2004.
-
(2004)
Ddos Mitigation Via Regional Cleaning Centers
-
-
Sharad, A.1
Travis, D.2
Christos, T.3
-
29
-
-
67349164787
-
Processing intrusion detection alert aggregates with time series modeling
-
J. Viinikka, H. Debar, L. Mé, A. Lehikoinen, and M. Tarvainen Processing intrusion detection alert aggregates with time series modeling Information Fusion 10 4 2009 312 324
-
(2009)
Information Fusion
, vol.10
, Issue.4
, pp. 312-324
-
-
Viinikka, J.1
Debar, H.2
Mé, L.3
Lehikoinen, A.4
Tarvainen, M.5
-
30
-
-
59949095579
-
Network anomaly detection based on wavelet analysis
-
W. Lu, and A.A. Ghorbani Network anomaly detection based on wavelet analysis EURASIP J. Adv. Signal Process. 4 2009 1 16
-
(2009)
EURASIP J. Adv. Signal Process.
, vol.4
, pp. 1-16
-
-
Lu, W.1
Ghorbani, A.A.2
-
33
-
-
33947660479
-
Covariance-matrix modeling and detecting various flooding attacks
-
DOI 10.1109/TSMCA.2006.889480, Special Issue on Critical Reliability Challenges and Practices
-
D.S. Yeung, S. Jin, and X. Wang Covariance-matrix modeling and detecting various flooding attacks IEEE Trans. Syst. Man. Cybern. Part A: Systems and Humans 37 2 2007 157 169 (Pubitemid 46485241)
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans
, vol.37
, Issue.2
, pp. 157-169
-
-
Yeung, D.S.1
Jin, S.2
Wang, X.3
-
35
-
-
0035015894
-
Using multiple hash functions to improve ip lookups
-
IEEE
-
M. Mitzenmacher, and A. Broder Using multiple hash functions to improve ip lookups IN Proceedings of IEEE INFOCOM 2000 IEEE 1454 1463
-
(2000)
Proceedings of IEEE INFOCOM
, pp. 1454-1463
-
-
Mitzenmacher, M.1
Broder, A.2
-
36
-
-
84893321707
-
Network applications of bloom filters: A survey
-
A. Broder, and M. Mitzenmacher Network applications of bloom filters: A survey Internet Math. 2002 636 646
-
(2002)
Internet Math.
, pp. 636-646
-
-
Broder, A.1
Mitzenmacher, M.2
|