메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Fingerprinting internet DNS amplification DDoS Activities

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL-OF-SERVICE ATTACK; INTERNET; NETWORK LAYERS; NETWORK SECURITY;

EID: 84901454848     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NTMS.2014.6814019     Document Type: Conference Paper
Times cited : (53)

References (26)
  • 1
    • 84907922541 scopus 로고    scopus 로고
    • Arbor Networks
    • Arbor Networks. 2012 Infrastructure Security Report.[Online]. Available: http://tinyurl.com/ag6tht4
    • (2012) Infrastructure Security Report
  • 2
    • 84901406051 scopus 로고    scopus 로고
    • US-CERT. DNS Amplification Attacks-Alert (TA13-088A)
    • US-CERT. DNS Amplification Attacks-Alert (TA13-088A).[Online]. Available: http://tinyurl.com/bp4xud4
  • 6
    • 84889029859 scopus 로고    scopus 로고
    • the 12th IEEE International Symposium on Network Computing and Applications (NCA), 2013
    • Fachkha et al., Towards a forecasting model for distributed denial of service activities, in the 12th IEEE International Symposium on Network Computing and Applications (NCA), 2013, 2013, pp. 110-117.
    • (2013) Towards A Forecasting Model for Distributed Denial of Service Activities , pp. 110-117
    • Fachkha1
  • 11
    • 77955771346 scopus 로고    scopus 로고
    • Dtrab:combating against attacks on encrypted protocols through traffic-feature analysis
    • Fadlullah et al., Dtrab:combating against attacks on encrypted protocols through traffic-feature analysis, IEEE/ACM Transactions on Networking (TON), vol. 18, no. 4, pp. 1234-1247, 2010.
    • (2010) IEEE/ACM Transactions on Networking (TON) , vol.18 , Issue.4 , pp. 1234-1247
    • Fadlullah1
  • 12
    • 78149346483 scopus 로고    scopus 로고
    • Passive ip traceback: Capturing the origin of anonymous traffic through network telescopes
    • Aug
    • Yao et al., Passive ip traceback: capturing the origin of anonymous traffic through network telescopes, SIGCOMM Comput. Commun. Rev., vol. 41, no. 4, Aug. 2010.
    • (2010) SIGCOMM Comput. Commun. Rev , vol.41 , Issue.4
    • Yao1
  • 13
    • 77954294167 scopus 로고    scopus 로고
    • Study on classification and characteristics of source address spoofing attacks in the internet
    • Washington DC, USA IEEE Computer Society
    • J. Bi, P. Hu, and P. Li, Study on classification and characteristics of source address spoofing attacks in the internet, in Proceedings of the 2010 Ninth International Conference on Networks. Washington, DC, USA: IEEE Computer Society, 2010.
    • (2010) Proceedings of the 2010 Ninth International Conference on Networks
    • Bi, J.1    Hu, P.2    Li, P.3
  • 14
    • 70350307600 scopus 로고    scopus 로고
    • High level internet scale traffic visualization using hilbert curve mapping
    • Springer
    • B. Irwin and N. Pilkington, High level internet scale traffic visualization using hilbert curve mapping, in VizSEC 2007. Springer, 2008.
    • (2007) VizSEC , vol.2008
    • Irwin, B.1    Pilkington, N.2
  • 16
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denial-of-service attacks
    • V. Paxson, An analysis of using reflectors for distributed denial-of-service attacks, SIGCOMM Comput. Commun. Rev., 2001.
    • (2001) SIGCOMM Comput. Commun. Rev
    • Paxson, V.1
  • 17
    • 84055171428 scopus 로고    scopus 로고
    • Corrupted dns resolution paths: The rise of a malicious resolution authority
    • Dagon et al., Corrupted dns resolution paths: The rise of a malicious resolution authority. in NDSS, 2008.
    • (2008) NDSS
    • Dagon1
  • 22
    • 14944380936 scopus 로고    scopus 로고
    • The top speed of flash worms
    • ser. WORM 04. New York, NY, USA: ACM
    • Staniford et al., The top speed of flash worms, in Proceedings of the 2004 ACM workshop on Rapid malcode, ser. WORM 04. New York, NY, USA: ACM, 2004, pp. 33-42.
    • (2004) Proceedings of the 2004 ACM Workshop on Rapid Malcode , pp. 33-42
    • Staniford1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.