메뉴 건너뛰기




Volumn , Issue , 2014, Pages 707-712

Detection on application layer DDoS using random walk model

Author keywords

anomaly detection; Asymmetric application layer DDoS attack; random walk model; similarity

Indexed keywords

BEHAVIORAL RESEARCH; INTERNET PROTOCOLS; MALWARE; NETWORK SECURITY; RANDOM PROCESSES; UBIQUITOUS COMPUTING;

EID: 84906992014     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2014.6883402     Document Type: Conference Paper
Times cited : (21)

References (14)
  • 1
    • 61449207953 scopus 로고    scopus 로고
    • DDoS-Shield: DDOS-resilient scheduling to counter application layer attacks
    • Feb.
    • S. Ranjan, R. Swaminathan, M. Uysal and E. Knightly, "DDoS-Shield: DDOS-Resilient Scheduling to Counter Application Layer Attacks," IEEE/ACM Transactions on Networking, vol. 17, no.1, pp. 26-39, Feb. 2009.
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , Issue.1 , pp. 26-39
    • Ranjan, S.1    Swaminathan, R.2    Uysal, M.3    Knightly, E.4
  • 3
    • 33847761464 scopus 로고    scopus 로고
    • Non-gaussian and long memory statistical characterizations for internet traffic with anomalies
    • Mar.
    • A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies," IEEE Trans. Dependable Secure Computing, vol. 4, no. 1, pp. 56-70, Mar. 2007.
    • (2007) IEEE Trans. Dependable Secure Computing , vol.4 , Issue.1 , pp. 56-70
    • Scherrer, A.1    Larrieu, N.2    Owezarski, P.3    Borgnat, P.4    Abry, P.5
  • 4
    • 79960618060 scopus 로고    scopus 로고
    • Browsing behavior mimicking attacks on popular web sites for large botnets
    • April.
    • S. Yu, G. Zhao, S. Guo, X. Yang, V. Athanasios, "Browsing behavior mimicking attacks on popular web sites for large botnets," IEEE INFOCOM Wksps, pp. 947-951, April. 2011.
    • (2011) IEEE INFOCOM Wksps , pp. 947-951
    • Yu, S.1    Zhao, G.2    Guo, S.3    Yang, X.4    Athanasios, V.5
  • 5
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and ddos problems
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of Network-Based Defense Mechanisms Countering the DoS and DdoS Problems," ACM Computing Survey, vol. 39, no. 1, pp. 123-128, 2007.
    • (2007) ACM Computing Survey , vol.39 , Issue.1 , pp. 123-128
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 8
    • 47249148481 scopus 로고    scopus 로고
    • Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
    • M. Srivatsa, A. Iyengar, J. Yin, et al, "Mitigating application-level denial of service attacks on Web servers: A client-transparent approach," ACM Transactions on the Web, vol. 3, no. 2, 15, 2008.
    • (2008) ACM Transactions on the Web , vol.3 , Issue.2 , pp. 15
    • Srivatsa, M.1    Iyengar, A.2    Yin, J.3
  • 10
  • 11
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Feb.
    • Y. Xie, SZ. Yu, "A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors," IEEE/ACM Transactions on Networking, vol. 1, no. 17, pp. 54-65, Feb. 2009.
    • (2009) IEEE/ACM Transactions on Networking , vol.1 , Issue.17 , pp. 54-65
    • Xie, Y.1    Yu, S.Z.2
  • 12
    • 84874774889 scopus 로고    scopus 로고
    • A novel model for user clicks identification based on hidden semi-Markov
    • Mar.
    • C. Xu, C. Du, G. Zhao, S. Yu, "A novel model for user clicks identification based on hidden semi-Markov," Journal of Network and Computer Applications, vol. 36, no. 2, pp. 791-798, Mar. 2013.
    • (2013) Journal of Network and Computer Applications , vol.36 , Issue.2 , pp. 791-798
    • Xu, C.1    Du, C.2    Zhao, G.3    Yu, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.