-
1
-
-
84873059665
-
A rank correlation based detection against distributed reflection DoS Attacks
-
W. Wei, F. Chen, Y. Xia, and G. Jin, "A Rank Correlation Based Detection against Distributed Reflection DoS Attacks," IEEE Communications Letters, vol. 17, no. 1, pp. 173-175, 2013
-
(2013)
IEEE Communications Letters
, vol.17
, Issue.1
, pp. 173-175
-
-
Wei, W.1
Chen, F.2
Xia, Y.3
Jin, G.4
-
2
-
-
84897441938
-
Detecting distributed denial of service attacks: Methods, tools and future directions
-
M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, and J. K. Kalita, "Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions," The Computer Journal, vol. 57, no. 4, pp. 537-556, 2014
-
(2014)
The Computer Journal
, vol.57
, Issue.4
, pp. 537-556
-
-
Bhuyan, M.H.1
Kashyap, H.J.2
Bhattacharyya, D.K.3
Kalita, J.K.4
-
3
-
-
79551523280
-
Traceback of DDoS attacks using entropy variations
-
March
-
S. Yu, W. Zhou, R. Doss, and W. Jia, "Traceback of DDoS Attacks Using Entropy Variations," IEEE Trans. Parallel Distributed Systems, vol. 22, no. 3, pp. 412-425, March 2011
-
(2011)
IEEE Trans. Parallel Distributed Systems
, vol.22
, Issue.3
, pp. 412-425
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Jia, W.4
-
4
-
-
79957530146
-
Low-Rate DDoS attacks detection and traceback by using new information metrics
-
Y. Xiang, K. Li, and W. Zhou, "Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics," IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426-437, 2011
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
5
-
-
77953221769
-
Detection of low-rate ddos attack based on self-similarity
-
March
-
Z. Sheng, Z. Qifei, P. Xuezeng, and Z. Xuhui, "Detection of Low-rate DDoS Attack Based on Self-Similarity," in 2nd International Workshop on Education Technology and Computer Science (ETCS), vol. 1, March 2010, pp. 333-336
-
(2010)
2nd International Workshop on Education Technology and Computer Science (ETCS
, vol.1
, pp. 333-336
-
-
Sheng, Z.1
Qifei, Z.2
Xuezeng, P.3
Xuhui, Z.4
-
6
-
-
84865731679
-
Flow level detection and filtering of low-rate DDoS
-
October
-
C. Zhang, Z. Cai, W. Chen, X. Luo, and J. Yin, "Flow Level Detection and Filtering of Low-rate DDoS," Comput. Netw., vol. 56, no. 15, pp. 3417-3431, October 2012
-
(2012)
Comput. Netw
, vol.56
, Issue.15
, pp. 3417-3431
-
-
Zhang, C.1
Cai, Z.2
Chen, W.3
Luo, X.4
Yin, J.5
-
8
-
-
84860544941
-
FireCol: A collaborative protection network for the detection of flooding ddos attacks
-
J. Francois, I. Aib, and R. Boutaba, "FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks," IEEE/ACM Transactions on Networking, vol. 20, no. 6, pp. 1828-1841, 2012
-
(2012)
IEEE/ACM Transactions on Networking
, vol.20
, Issue.6
, pp. 1828-1841
-
-
Francois, J.1
Aib, I.2
Boutaba, R.3
-
10
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon, "A Mathematical Theory of Communication," Bell system technical journal, vol. 27, pp. 397-423, 1948
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 397-423
-
-
Shannon, C.E.1
-
11
-
-
84870694700
-
AOCD: An adaptive outlier based coordinated scan detection approach
-
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach," International Journal of Network Security, vol. 14, no. 6, pp. 339-351, 2012
-
(2012)
International Journal of Network Security
, vol.14
, Issue.6
, pp. 339-351
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
12
-
-
84894646147
-
Network anomaly detection: Methods, systems and tools
-
"Network Anomaly Detection: Methods, Systems and Tools," IEEE Communications Surveys Tutorials, vol. 16, no. 1, pp. 303-336, 2014
-
(2014)
IEEE Communications Surveys Tutorials
, vol.16
, Issue.1
, pp. 303-336
-
-
-
13
-
-
84908651594
-
-
MIT LLS DDOS 0.2.2Massachusetts Institute of Technology Cambridge,MA
-
MIT Lincoln Laboratory Datasets, "MIT LLS DDOS 0.2.2," http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ ideval/data/2000data.html, 2000, Massachusetts Institute of Technology, Cambridge,MA
-
(2000)
MIT Lincoln Laboratory Datasets
-
-
-
15
-
-
33745205813
-
Inferring internet denial-of-service activity
-
May
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, "Inferring Internet Denial-of-service Activity," ACM Trans. Computer System, vol. 24, no. 2, pp. 115-139, May 2006.
-
(2006)
ACM Trans. Computer System
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
|