-
1
-
-
34147099073
-
Survey of networkbased defense mechanisms countering the DOS and DDoS problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of networkbased defense mechanisms countering the DOS and DDoS problems," ACM Comput. Surv., vol. 39, no. 1, 2007.
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
2
-
-
77955872093
-
On anonymity in an electronic society: A survey of anonymous communication systems
-
M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Comput. Surv., vol. 42, no. 1, 2009.
-
(2009)
ACM Comput. Surv.
, vol.42
, Issue.1
-
-
Edman, M.1
Yener, B.2
-
3
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in Proc.ACMConf. Comput. Commun. Security, 2009.
-
(2009)
Proc. ACM Conf. Comput. Commun. Security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
4
-
-
79951817047
-
Towards situational awareness of large-scale botnet probing events
-
Mar.
-
Z. Li, A. Goyal, Y. Chen, and V. Paxson, "Towards situational awareness of large-scale botnet probing events," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 175-188, Mar. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 175-188
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
Paxson, V.4
-
5
-
-
84857360605
-
Abnormally malicious autonomous systems and their internet connectivity
-
Feb.
-
C. A. Shue, A. J. Kalafut, and M. Gupta, "Abnormally malicious autonomous systems and their internet connectivity," IEEE/ACM Trans. Netw., vol. 20, no. 1, pp. 220-230, Feb. 2012.
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.1
, pp. 220-230
-
-
Shue, C.A.1
Kalafut, A.J.2
Gupta, M.3
-
6
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging," in Proc. 1st Conf. Workshop Hot Topics Understanding Botnets (HotBots'07), 2007.
-
(2007)
Proc. 1st Conf. Workshop Hot Topics Understanding Botnets (HotBots'07)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
7
-
-
79957629730
-
Identifying suspicious activities through DNS failure graph analysis
-
N. Jiang, J. Cao, Y. Jin, L. E. Li, and Z.-L. Zhang, "Identifying suspicious activities through DNS failure graph analysis," in Proc. IEEE Int. Conf. Netw. Protocols, 2010, pp. 144-153.
-
(2010)
Proc. IEEE Int. Conf. Netw. Protocols
, pp. 144-153
-
-
Jiang, N.1
Cao, J.2
Jin, Y.3
Li, L.E.4
Zhang, Z.-L.5
-
8
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
S. Yadav, A. K. K. Reddy, A. L. N. Reddy, and S. Ranjan, "Detecting algorithmically generated malicious domain names," in Proc. Internet Meas. Conf., 2010, pp. 48-61.
-
(2010)
Proc. Internet Meas. Conf.
, pp. 48-61
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.L.N.3
Ranjan, S.4
-
9
-
-
36249008514
-
A survey of bots used for distributed denial of service attacks
-
V. L. L. Thing, M. Sloman, and N. Dulay, "A survey of bots used for distributed denial of service attacks," in SEC, 2007, pp. 229-240.
-
(2007)
SEC
, pp. 229-240
-
-
Thing, V.L.L.1
Sloman, M.2
Dulay, N.3
-
11
-
-
77952687808
-
An advanced hybrid peer-topeer botnet
-
Mar./Apr.
-
P. Wang, S. Sparks, and C. C. Zou, "An advanced hybrid peer-topeer botnet," IEEE Trans. Dependable Secure Comput., vol. 7, no. 2, pp. 113-127, Mar./Apr. 2010.
-
(2010)
IEEE Trans. Dependable Secure Comput.
, vol.7
, Issue.2
, pp. 113-127
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
12
-
-
66249147541
-
A survey of botnet technology and defenses
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, "A survey of botnet technology and defenses," in Proc. Cybersecurity Appl. Technol. Conf. Homeland Security, 2009.
-
(2009)
Proc. Cybersecurity Appl. Technol. Conf. Homeland Security
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
13
-
-
58149490850
-
Information theory based detection against network behavior mimicking DDoS attack
-
Apr.
-
S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking DDoS attack," IEEE Commun. Lett., vol. 12, no. 4, pp. 319-321, Apr. 2008.
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.4
, pp. 319-321
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
-
14
-
-
33847761464
-
Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies
-
Jan./Mar.
-
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies," IEEE Trans. Dependable Secure Comput., vol. 4, no. 1, pp. 56-70, Jan./Mar. 2007.
-
(2007)
IEEE Trans. Dependable Secure Comput.
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
15
-
-
70349659341
-
Adaptive early packet filtering for protecting firewalls againstDOSattacks
-
A. El-Atawy, E. Al-Shaer, T. Tran, and R. Boutaba, "Adaptive early packet filtering for protecting firewalls againstDOSattacks," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2009.
-
(2009)
Proc. IEEE Conf. Comput. Commun. (INFOCOM)
-
-
El-Atawy, A.1
Al-Shaer, E.2
Tran, T.3
Boutaba, R.4
-
16
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: Characterization and implications for CDNS and web sites," in Proc. World Wide Web (WWW), 2002, pp. 252-262.
-
(2002)
Proc. World Wide Web (WWW)
, pp. 252-262
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
17
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
Jan./Feb.
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-service attack-detection techniques," IEEE Internet Comput., vol. 10, no. 1, pp. 82-89, Jan./Feb. 2006.
-
(2006)
IEEE Internet Comput.
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
18
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
Y. Chen and K. Hwang, "Collaborative detection and filtering of shrew DDoS attacks using spectral analysis," J. Parallel Distrib. Comput., vol. 66, no. 9, pp. 1137-1151, 2006.
-
(2006)
J. Parallel Distrib. Comput.
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
19
-
-
84924375780
-
Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds (awarded best student paper)
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds (awarded best student paper)," in Proc. Symp. Netw. Syst. Des. Implement. (NSDI), 2005.
-
(2005)
Proc. Symp. Netw. Syst. Des. Implement. (NSDI)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
20
-
-
61449197774
-
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
-
Feb.
-
Y. Xie and S.-Z. Yu, "A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors," IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 54-65, Feb. 2009.
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.-Z.2
-
21
-
-
84864147184
-
Prediction of user's web-browsing behavior: Application of Markov model
-
Feb.
-
M. A. Awad and I. Khalil, "Prediction of user's web-browsing behavior: Application of Markov model," IEEE Trans. Syst. Man Cybern. B, vol. 42, no. 4, pp. 1131-1142, Feb. 2012.
-
(2012)
IEEE Trans. Syst. Man Cybern. B
, vol.42
, Issue.4
, pp. 1131-1142
-
-
Awad, M.A.1
Khalil, I.2
-
23
-
-
84861634583
-
Can we beat legitimate cyber behavior mimicking attacks from botnets
-
S. Yu, S. Guo, and I. Stojmenovic, "Can we beat legitimate cyber behavior mimicking attacks from botnets," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2012, pp. 3133-3137.
-
(2012)
Proc. IEEE Conf. Comput. Commun. (INFOCOM)
, pp. 3133-3137
-
-
Yu, S.1
Guo, S.2
Stojmenovic, I.3
-
24
-
-
33947425424
-
Citations and the Zipf-Mandelbrot's law
-
Z. K. Silagadze, "Citations and the Zipf-Mandelbrot's law," Complex Syst., vol. 11, p. 487, 1997.
-
(1997)
Complex Syst.
, vol.11
, pp. 487
-
-
Silagadze, Z.K.1
-
25
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
M. E. Crovella and A. Bestavros, "Self-similarity in world wide web traffic: Evidence and possible causes," IEEE/ACM Trans. Netw., vol. 5, no. 6, pp. 835-846, 1997.
-
(1997)
IEEE/ACM Trans. Netw.
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
26
-
-
0032670943
-
Web caching and Zipf-like distributions: Evidence and implications
-
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and Zipf-like distributions: Evidence and implications," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 1999, pp. 126-134.
-
(1999)
Proc. IEEE Conf. Comput. Commun. (INFOCOM)
, pp. 126-134
-
-
Breslau, L.1
Cao, P.2
Fan, L.3
Phillips, G.4
Shenker, S.5
-
27
-
-
70349684725
-
Seven years and one day: Sketching the evolution of internet traffic
-
P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, "Seven years and one day: Sketching the evolution of internet traffic," in Proc. IEEE Conf. Comput. Commun. (INFOCOM), 2009, pp. 711-719.
-
(2009)
Proc. IEEE Conf. Comput. Commun. (INFOCOM)
, pp. 711-719
-
-
Borgnat, P.1
Dewaele, G.2
Fukuda, K.3
Abry, P.4
Cho, K.5
-
28
-
-
27944510109
-
Longitudinal study of internet traffic in 1998-2003
-
M. Fomenkov, K. Keys, D. Moore, and K. Claffy, "Longitudinal study of internet traffic in 1998-2003," in Proc. Int. Symp. Inf. Commun. Technol. (WISICT), 2004.
-
(2004)
Proc. Int. Symp. Inf. Commun. Technol. (WISICT)
-
-
Fomenkov, M.1
Keys, K.2
Moore, D.3
Claffy, K.4
-
29
-
-
84896324406
-
-
WorldCup98 [Online]. Available: http://ita.ee.lbl.gov/html/contrib/WorldCup.html
-
World Cup 98
-
-
-
31
-
-
84919478393
-
Browsing behavior mimicking attacks on popular websites
-
S. Yu, G. Zhao, S. Guo, Y. Xiang, and A. Vasilakos, "Browsing behavior mimicking attacks on popular websites," in Proc. IEEE Conf. Comput. Commun. (INFOCOM) Workshops, 2011.
-
(2011)
Proc. IEEE Conf. Comput. Commun. (INFOCOM) Workshops
-
-
Yu, S.1
Zhao, G.2
Guo, S.3
Xiang, Y.4
Vasilakos, A.5
-
32
-
-
39049125624
-
Controlling IP spoofing through interdomain packet filters
-
Jan./Mar.
-
Z. Duan, X. Yuan, and J. Chandrashekar, "Controlling IP spoofing through interdomain packet filters," IEEE Trans. Dependable Secure Comput., vol. 5, no. 1, pp. 22-36, Jan./Mar. 2008.
-
(2008)
IEEE Trans. Dependable Secure Comput.
, vol.5
, Issue.1
, pp. 22-36
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
33
-
-
33947503628
-
Defense against spoofed IP traffic using hop-count filtering
-
Feb.
-
H. Wang, C. Jin, and K. G. Shin, "Defense against spoofed IP traffic using hop-count filtering," IEEE/ACM Trans. Netw., vol. 15, no. 1, pp. 40-53, Feb. 2007.
-
(2007)
IEEE/ACM Trans. Netw.
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
34
-
-
33646742035
-
Packetscore: A statistics-based packet filtering scheme against distributed denialof-service attacks
-
Apr./Jun.
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "Packetscore: A statistics-based packet filtering scheme against distributed denialof-service attacks," IEEE Trans. Dependable Secure Comput., vol. 3, no. 2, pp. 141-155, Apr./Jun. 2006.
-
(2006)
IEEE Trans. Dependable Secure Comput.
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
35
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song, "Insights from the inside: A view of botnet management from infiltration," in Proc. USENIX Workshop Large-Scale Exploits Emergent Threats (LEET), 2010.
-
(2010)
Proc. USENIX Workshop Large-Scale Exploits Emergent Threats (LEET)
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
36
-
-
71749083441
-
Collaborative detection of fast flux phishing domains
-
C. V. Zhou, C. Leckie, and S. Karunasekera, "Collaborative detection of fast flux phishing domains," J. Netw., vol. 4, no. 1, pp. 75-84, 2009.
-
(2009)
J. Netw.
, vol.4
, Issue.1
, pp. 75-84
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
37
-
-
77957670215
-
Fast-flux attack network identification based on agent lifespan
-
Jun.
-
S. Yu, S. Zhou, and S. Wang, "Fast-flux attack network identification based on agent lifespan," in Proc. IEEE Int. Conf. Wireless Commun. Netw. Inf. Security (WCNIS), Jun. 2010, pp. 658-662.
-
(2010)
Proc. IEEE Int. Conf. Wireless Commun. Netw. Inf. Security (WCNIS)
, pp. 658-662
-
-
Yu, S.1
Zhou, S.2
Wang, S.3
-
39
-
-
14944364487
-
Characterizing the query behavior in peer-to-peer file sharing systems
-
A. Klemm, C. Lindemann, M. K. Vernon, and O. P. Waldhorst, "Characterizing the query behavior in peer-to-peer file sharing systems," in Proc. 4th ACM SIGCOMM Conf. Internet Meas., 2004, pp. 55-67.
-
(2004)
Proc. 4th ACM SIGCOMM Conf. Internet Meas.
, pp. 55-67
-
-
Klemm, A.1
Lindemann, C.2
Vernon, M.K.3
Waldhorst, O.P.4
-
40
-
-
57949085517
-
Traffic modeling and proportional partial caching for peer-to-peer systems
-
Dec.
-
M. Hefeeda and O. Saleh, "Traffic modeling and proportional partial caching for peer-to-peer systems," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1447-1460, Dec. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.6
, pp. 1447-1460
-
-
Hefeeda, M.1
Saleh, O.2
-
41
-
-
79960601554
-
A brief history of generative models for power law and lognornal distributions
-
M. Mitzenmacher, "A brief history of generative models for power law and lognornal distributions," Internet Math., vol. 1, 2004.
-
(2004)
Internet Math.
, vol.1
-
-
Mitzenmacher, M.1
-
42
-
-
3042550642
-
The double pareto-lognormal distribution-A new parametric model for size distributions
-
W. J. Reed and M. Jorgensen, "The double pareto-lognormal distribution-A new parametric model for size distributions," Commun. Stat. Theory Methods, vol. 33, no. 8, pp. 1733-1753, 2003.
-
(2003)
Commun. Stat. Theory Methods
, vol.33
, Issue.8
, pp. 1733-1753
-
-
Reed, W.J.1
Jorgensen, M.2
-
43
-
-
0032478716
-
Strong regularities in world wide web surfing
-
B. A. Huberman, P. L. T. Pirolli, J. E. Pitkow, and R. M. Lukose, "Strong regularities in world wide web surfing," Science, vol. 280, no. 3, 1998.
-
(1998)
Science
, vol.280
, Issue.3
-
-
Huberman, B.A.1
Pirolli, P.L.T.2
Pitkow, J.E.3
Lukose, R.M.4
-
44
-
-
36249029853
-
Correntropy: Properties and applications in non-Gaussian signal processing
-
Nov.
-
W. Liu, P. P. Pokharel, and J. C. Principe, "Correntropy: Properties and applications in non-Gaussian signal processing," IEEE Trans. Signal Process., vol. 55, no. 11, pp. 5286-5298, Nov. 2007.
-
(2007)
IEEE Trans. Signal Process.
, vol.55
, Issue.11
, pp. 5286-5298
-
-
Liu, W.1
Pokharel, P.P.2
Principe, J.C.3
-
45
-
-
79959526388
-
Maximum correntropy criterion for robust face recognition
-
Aug.
-
R. He, W.-S. Zheng, and B.-G. Hu, "Maximum correntropy criterion for robust face recognition," IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 8, pp. 1561-1576, Aug. 2011.
-
(2011)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.33
, Issue.8
, pp. 1561-1576
-
-
He, R.1
Zheng, W.-S.2
Hu, B.-G.3
-
46
-
-
27544453628
-
User centric walk: An integrated approach for modeling the browsing behavior of users on the web
-
S. Burklen, P. J. Marron, S. Fritsch, and K. Rothermel, "User centric walk: An integrated approach for modeling the browsing behavior of users on the web," in Proc. 38th Annu. Symp. Simul. (ANSS'05), 2005 pp. 149-159.
-
(2005)
Proc. 38th Annu. Symp. Simul. (ANSS'05)
, pp. 149-159
-
-
Burklen, S.1
Marron, P.J.2
Fritsch, S.3
Rothermel, K.4
-
47
-
-
67649889403
-
Flexible deterministic packet marking: An IP traceback system to find the real source of attacks
-
June
-
Y. Xiang, W. Zhou, and M. Guo, "Flexible deterministic packet marking: An IP traceback system to find the real source of attacks," IEEETrans. Parallel Distrib. Syst., vol. 20, no. 4, pp. 567-580, June 2009.
-
(2009)
IEEETrans. Parallel Distrib. Syst.
, vol.20
, Issue.4
, pp. 567-580
-
-
Xiang, Y.1
Zhou, W.2
Guo, M.3
-
48
-
-
79551523280
-
Traceback of DDoS attacks using entropy variations
-
Mar.
-
S. Yu, W. Zhou, R. Doss, and W. Jia, "Traceback of DDoS attacks using entropy variations," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 3, pp. 412-425, Mar. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.3
, pp. 412-425
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
Jia, W.4
-
49
-
-
84904090216
-
A dynamical deterministic packet marking scheme for DDoS traceback
-
S. Yu, W. Zhou, S. Guo, and M. Guo, "A dynamical deterministic packet marking scheme for DDoS traceback," in Proc. IEEE Global Telecommun. Conf. (Globecom), 2013.
-
(2013)
Proc IEEE Global Telecommun. Conf. (Globecom)
-
-
Yu, S.1
Zhou, W.2
Guo, S.3
Guo, M.4
|